7e872dd7e8ba737aa5061bd410b32c957bcf1443dd0b92f6811e22955010a483972df1352a9f5b3457234d858337d7ecbd9faf04cfc811eb98bdac05f21d943f2ad611c2d6a54d75a1299366c0a2b4b35d64acb79a87c92a9583c5fde702f3dd84a08f1a38c490c8abbb55794f8c3d909c667469e9d48687e6cbfd9410f54490eb91325a7be136e17f3283bd708e1f26bf27d1694d2328134ac482ddc81ac6165e5506d44fc040f052b05637c473ecbe6a6b99", 0xb4, 0x3}, {&(0x7f0000000780)="da0f6a87f019068373d35fdd8b2a82c4365309203be7b0bfffb0f2902af43e01a36fb3cd230b4d7c9cf488a109dd6a9275aa9ccc501c85072dbdc2a33ac8a59892f8b0478217e7e6967da4d9bc6449afe98a7037aa55c503652b953cdb10558f1e0455ff0ae56d173f4643398a205e64a04d4b54b99fbaa257c5259732c4ddc808de8b86fa83e215a7ac57e6024a3d76becdd241255118a1240d29d22d7ef5fc0bf6cb4a4587fe2eb7e2f1b84a508be76c978ac9664d524151d4691cd389b1f61b4af91c2ae79a928f267bf45f480b3509d5108512292de496aa93f357b16ecfe566ed22c13f06", 0xe7, 0x5}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) syz_open_dev$vcsa(&(0x7f0000000140), 0xffffffffffffffe0, 0x2000) 05:45:07 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 2: syz_open_procfs(0x0, 0x0) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a00004000000080000000808000000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) 05:45:07 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) syz_mount_image$omfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x9, &(0x7f0000000880)=[{&(0x7f00000001c0)="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", 0xfe, 0x100}, {&(0x7f00000002c0)="9a6d316f44234a7b9d7ff57dbc77bef31c942e892579487dc63765d3811a7c2000a1543093a6391e21048ae2d79bb8d20d12a95db962905ccc424c06c107f2cbc373688dd2aa358f24ea69739d6ae395d7555776f3385b5826bb2dcadf8254d63813564571213870d005f9169ac0a30e6a5c869d295b1e812e325c4e7ce34d4aa50e69913ec8b1ab2bdb23825522e25552d7a98ee7ae0100f53cb6cf8aefb513fa458b8f41", 0xa5}, {&(0x7f0000000380)="0c8f2ffc2ddd8b2634d8f03b79c5365aa7a9025fc88e7da2661b75aa0b48ad0dd354e17017a1e7c76b91fa1c2165ad769262fbb6f921c19aa11ba257cae56b4839f9f4443f8ae844b205d66afbdc55adf036366b110367fdfa296a3014744bd3eec9f0d5807ad47bc8ef8b12206480488a7a1ee8e7d4be4c502a34cdedcd30208f8d50d1696ef42f00e38861d7088494d62371f6e2bf78e7f79275fd8624636fd6dbc5baf5be7659c9c9ba34261e46d653c6214f2b97aa76c85d1ff9f5b6f06bcae111a4998e1f0ceb0a2a5656d8af76e7d177ca54609abf0c7e1dd59c7a2d4fc60cd8fcc9728ad558d8be97c143673d", 0xf0, 0x1}, {&(0x7f0000000480)="5a0c50492a643a2341571f1ff4a60ea617ffe10dfb27b6b44619cb0df174c9d12c13fd2baf06160dbe84002b44cca8dffad4b5260daf0b8c42761f6ada9bc0fc60f7e855233fb042aff4f6fae32682c974487e0262da8a688db5a0cb27ed13439d8a50d7edadd50b891d80462b0f520e53006ae6131270eac5", 0x79, 0xf2f0}, {&(0x7f0000000500)="a72fd2073f8798ecfe9ea467c8c6cb3fc3fc46b62675ff07ad5b68dea26e6bed88af54b541c556063b6729ae3b463f586a090ea451cab4815f28272ebb7d144458b31c9b034e12ba3ee35a20cfef10dae6305a89728547021246eebeb2b325284b5ae1ba8612a0a484ddfdbd53219ddbea17e880ef57b9d79b7031005c7f8d67e2822bb604a8fa370a29d3ef6c9268a970e5910503c3abf55808fc5317393851dd0121cd4f07bc", 0xa7, 0x2a}, {&(0x7f00000005c0)="5ae2636589a2d24bd053353a1ec2866152e9d28de1645975bcb1454ee30ef8e84a5ff580cc9eaa09f529b1120a8bc1844f3dd77b741ce49cf904783977757a8c50b3e32fb2321fe00eba8df4746f7615f15bbf7dbe19c5f45a3b6399e0569815c90cdc4899a2834ee6205f3e08e369220aa8688fef206a44463843ac90a845", 0x7f, 0x9}, {&(0x7f0000000640)="fbc1173ecf27a864b0706cde54e1921bbb8902dafca2f7aa092765bc3464257e6cfaa112a2a671fa24ddc8b3617b19ffd6186b803a1dbe953c87ff54df7690aa8397864355e4b5e5969a610e7b5856cb1c74cd5ae68bc9253ac18e01c9020acbc94a63a1d34ab7cab2629e26d5fcd0e5d4508fe627093f21", 0xb0, 0x3}, {&(0x7f00000006c0)="217e872dd7e8ba737aa5061bd410b32c957bcf1443dd0b92f6811e22955010a483972df1352a9f5b3457234d858337d7ecbd9faf04cfc811eb98bdac05f21d943f2ad611c2d6a54d75a1299366c0a2b4b35d64acb79a87c92a9583c5fde702f3dd84a08f1a38c490c8abbb55794f8c3d909c667469e9d48687e6cbfd9410f54490eb91325a7be136e17f3283bd708e1f26bf27d1694d2328134ac482ddc81ac6165e5506d44fc040f052b05637c473ecbe6a6b99", 0xb4, 0x3}, {&(0x7f0000000780)="da0f6a87f019068373d35fdd8b2a82c4365309203be7b0bfffb0f2902af43e01a36fb3cd230b4d7c9cf488a109dd6a9275aa9ccc501c85072dbdc2a33ac8a59892f8b0478217e7e6967da4d9bc6449afe98a7037aa55c503652b953cdb10558f1e0455ff0ae56d173f4643398a205e64a04d4b54b99fbaa257c5259732c4ddc808de8b86fa83e215a7ac57e6024a3d76becdd241255118a1240d29d22d7ef5fc0bf6cb4a4587fe2eb7e2f1b84a508be76c978ac9664d524151d4691cd389b1f61b4af91c2ae79a928f267bf45f480b3509d5108512292de496aa93f357b16ecfe566ed22c13f06", 0xe7, 0x5}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="aafeffffffffffffff6e0001e12eec4c47ba0f4a2172abb79e995daccb265a703197db45d00362ed65694f552083070000000fdc62e4267ceededb5b6bcfd371fc2c646f6e745f686173682c736d61636b6673666c6f6f723d7d275e2c4cd28511d01ba9f76f626a5f757365bca82f4cfe7a44767c73c4502bacfe7b9f82d108e88749965eefbdb3b221b73bfcf2a4c43c003fa76d50e169f8da0136a609a2d51fa3b2857be727ec2822ee3a07434e63b82b99d3ca2ffdf8d2955a950cbfbdedb2d581b975cd0b0a34a25dd8a038e2ea93eb90a73797b6d1040382289ac975d5595e7a314af100ad409fe688a712175b47349c24a559d8709ec25b07131d"]) syz_open_dev$vcsa(&(0x7f0000000140), 0xffffffffffffffe0, 0x2000) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a00004000000080000000808000000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:07 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) syz_mount_image$omfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x9, &(0x7f0000000880)=[{&(0x7f00000001c0)="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", 0xfe, 0x100}, {&(0x7f00000002c0)="9a6d316f44234a7b9d7ff57dbc77bef31c942e892579487dc63765d3811a7c2000a1543093a6391e21048ae2d79bb8d20d12a95db962905ccc424c06c107f2cbc373688dd2aa358f24ea69739d6ae395d7555776f3385b5826bb2dcadf8254d63813564571213870d005f9169ac0a30e6a5c869d295b1e812e325c4e7ce34d4aa50e69913ec8b1ab2bdb23825522e25552d7a98ee7ae0100f53cb6cf8aefb513fa458b8f41", 0xa5}, {&(0x7f0000000380)="0c8f2ffc2ddd8b2634d8f03b79c5365aa7a9025fc88e7da2661b75aa0b48ad0dd354e17017a1e7c76b91fa1c2165ad769262fbb6f921c19aa11ba257cae56b4839f9f4443f8ae844b205d66afbdc55adf036366b110367fdfa296a3014744bd3eec9f0d5807ad47bc8ef8b12206480488a7a1ee8e7d4be4c502a34cdedcd30208f8d50d1696ef42f00e38861d7088494d62371f6e2bf78e7f79275fd8624636fd6dbc5baf5be7659c9c9ba34261e46d653c6214f2b97aa76c85d1ff9f5b6f06bcae111a4998e1f0ceb0a2a5656d8af76e7d177ca54609abf0c7e1dd59c7a2d4fc60cd8fcc9728ad558d8be97c143673d", 0xf0, 0x1}, {&(0x7f0000000480)="5a0c50492a643a2341571f1ff4a60ea617ffe10dfb27b6b44619cb0df174c9d12c13fd2baf06160dbe84002b44cca8dffad4b5260daf0b8c42761f6ada9bc0fc60f7e855233fb042aff4f6fae32682c974487e0262da8a688db5a0cb27ed13439d8a50d7edadd50b891d80462b0f520e53006ae6131270eac5", 0x79, 0xf2f0}, {&(0x7f0000000500)="a72fd2073f8798ecfe9ea467c8c6cb3fc3fc46b62675ff07ad5b68dea26e6bed88af54b541c556063b6729ae3b463f586a090ea451cab4815f28272ebb7d144458b31c9b034e12ba3ee35a20cfef10dae6305a89728547021246eebeb2b325284b5ae1ba8612a0a484ddfdbd53219ddbea17e880ef57b9d79b7031005c7f8d67e2822bb604a8fa370a29d3ef6c9268a970e5910503c3abf55808fc5317393851dd0121cd4f07bc", 0xa7, 0x2a}, {&(0x7f00000005c0)="5ae2636589a2d24bd053353a1ec2866152e9d28de1645975bcb1454ee30ef8e84a5ff580cc9eaa09f529b1120a8bc1844f3dd77b741ce49cf904783977757a8c50b3e32fb2321fe00eba8df4746f7615f15bbf7dbe19c5f45a3b6399e0569815c90cdc4899a2834ee6205f3e08e369220aa8688fef206a44463843ac90a845", 0x7f, 0x9}, {&(0x7f0000000640)="fbc1173ecf27a864b0706cde54e1921bbb8902dafca2f7aa092765bc3464257e6cfaa112a2a671fa24ddc8b3617b19ffd6186b803a1dbe953c87ff54df7690aa8397864355e4b5e5969a610e7b5856cb1c74cd5ae68bc9253ac18e01c9020acbc94a63a1d34ab7cab2629e26d5fcd0e5d4508fe627093f21", 0xb0, 0x3}, {&(0x7f00000006c0)="217e872dd7e8ba737aa5061bd410b32c957bcf1443dd0b92f6811e22955010a483972df1352a9f5b3457234d858337d7ecbd9faf04cfc811eb98bdac05f21d943f2ad611c2d6a54d75a1299366c0a2b4b35d64acb79a87c92a9583c5fde702f3dd84a08f1a38c490c8abbb55794f8c3d909c667469e9d48687e6cbfd9410f54490eb91325a7be136e17f3283bd708e1f26bf27d1694d2328134ac482ddc81ac6165e5506d44fc040f052b05637c473ecbe6a6b99", 0xb4, 0x3}, {&(0x7f0000000780)="da0f6a87f019068373d35fdd8b2a82c4365309203be7b0bfffb0f2902af43e01a36fb3cd230b4d7c9cf488a109dd6a9275aa9ccc501c85072dbdc2a33ac8a59892f8b0478217e7e6967da4d9bc6449afe98a7037aa55c503652b953cdb10558f1e0455ff0ae56d173f4643398a205e64a04d4b54b99fbaa257c5259732c4ddc808de8b86fa83e215a7ac57e6024a3d76becdd241255118a1240d29d22d7ef5fc0bf6cb4a4587fe2eb7e2f1b84a508be76c978ac9664d524151d4691cd389b1f61b4af91c2ae79a928f267bf45f480b3509d5108512292de496aa93f357b16ecfe566ed22c13f06", 0xe7, 0x5}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) syz_open_dev$vcsa(&(0x7f0000000140), 0xffffffffffffffe0, 0x2000) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffffff7f0000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) syz_mount_image$omfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x9, &(0x7f0000000880)=[{&(0x7f00000001c0)="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", 0xfe, 0x100}, {&(0x7f00000002c0)="9a6d316f44234a7b9d7ff57dbc77bef31c942e892579487dc63765d3811a7c2000a1543093a6391e21048ae2d79bb8d20d12a95db962905ccc424c06c107f2cbc373688dd2aa358f24ea69739d6ae395d7555776f3385b5826bb2dcadf8254d63813564571213870d005f9169ac0a30e6a5c869d295b1e812e325c4e7ce34d4aa50e69913ec8b1ab2bdb23825522e25552d7a98ee7ae0100f53cb6cf8aefb513fa458b8f41", 0xa5}, {&(0x7f0000000380)="0c8f2ffc2ddd8b2634d8f03b79c5365aa7a9025fc88e7da2661b75aa0b48ad0dd354e17017a1e7c76b91fa1c2165ad769262fbb6f921c19aa11ba257cae56b4839f9f4443f8ae844b205d66afbdc55adf036366b110367fdfa296a3014744bd3eec9f0d5807ad47bc8ef8b12206480488a7a1ee8e7d4be4c502a34cdedcd30208f8d50d1696ef42f00e38861d7088494d62371f6e2bf78e7f79275fd8624636fd6dbc5baf5be7659c9c9ba34261e46d653c6214f2b97aa76c85d1ff9f5b6f06bcae111a4998e1f0ceb0a2a5656d8af76e7d177ca54609abf0c7e1dd59c7a2d4fc60cd8fcc9728ad558d8be97c143673d", 0xf0, 0x1}, {&(0x7f0000000480)="5a0c50492a643a2341571f1ff4a60ea617ffe10dfb27b6b44619cb0df174c9d12c13fd2baf06160dbe84002b44cca8dffad4b5260daf0b8c42761f6ada9bc0fc60f7e855233fb042aff4f6fae32682c974487e0262da8a688db5a0cb27ed13439d8a50d7edadd50b891d80462b0f520e53006ae6131270eac5", 0x79, 0xf2f0}, {&(0x7f0000000500)="a72fd2073f8798ecfe9ea467c8c6cb3fc3fc46b62675ff07ad5b68dea26e6bed88af54b541c556063b6729ae3b463f586a090ea451cab4815f28272ebb7d144458b31c9b034e12ba3ee35a20cfef10dae6305a89728547021246eebeb2b325284b5ae1ba8612a0a484ddfdbd53219ddbea17e880ef57b9d79b7031005c7f8d67e2822bb604a8fa370a29d3ef6c9268a970e5910503c3abf55808fc5317393851dd0121cd4f07bc", 0xa7, 0x2a}, {&(0x7f00000005c0)="5ae2636589a2d24bd053353a1ec2866152e9d28de1645975bcb1454ee30ef8e84a5ff580cc9eaa09f529b1120a8bc1844f3dd77b741ce49cf904783977757a8c50b3e32fb2321fe00eba8df4746f7615f15bbf7dbe19c5f45a3b6399e0569815c90cdc4899a2834ee6205f3e08e369220aa8688fef206a44463843ac90a845", 0x7f, 0x9}, {&(0x7f0000000640)="fbc1173ecf27a864b0706cde54e1921bbb8902dafca2f7aa092765bc3464257e6cfaa112a2a671fa24ddc8b3617b19ffd6186b803a1dbe953c87ff54df7690aa8397864355e4b5e5969a610e7b5856cb1c74cd5ae68bc9253ac18e01c9020acbc94a63a1d34ab7cab2629e26d5fcd0e5d4508fe627093f21", 0xb0, 0x3}, {&(0x7f00000006c0)="217e872dd7e8ba737aa5061bd410b32c957bcf1443dd0b92f6811e22955010a483972df1352a9f5b3457234d858337d7ecbd9faf04cfc811eb98bdac05f21d943f2ad611c2d6a54d75a1299366c0a2b4b35d64acb79a87c92a9583c5fde702f3dd84a08f1a38c490c8abbb55794f8c3d909c667469e9d48687e6cbfd9410f54490eb91325a7be136e17f3283bd708e1f26bf27d1694d2328134ac482ddc81ac6165e5506d44fc040f052b05637c473ecbe6a6b99", 0xb4, 0x3}, {&(0x7f0000000780)="da0f6a87f019068373d35fdd8b2a82c4365309203be7b0bfffb0f2902af43e01a36fb3cd230b4d7c9cf488a109dd6a9275aa9ccc501c85072dbdc2a33ac8a59892f8b0478217e7e6967da4d9bc6449afe98a7037aa55c503652b953cdb10558f1e0455ff0ae56d173f4643398a205e64a04d4b54b99fbaa257c5259732c4ddc808de8b86fa83e215a7ac57e6024a3d76becdd241255118a1240d29d22d7ef5fc0bf6cb4a4587fe2eb7e2f1b84a508be76c978ac9664d524151d4691cd389b1f61b4af91c2ae79a928f267bf45f480b3509d5108512292de496aa93f357b16ecfe566ed22c13f06", 0xe7, 0x5}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) 05:45:07 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:07 executing program 0: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:08 executing program 5: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:08 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) syz_mount_image$omfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x6, 0x9, &(0x7f0000000880)=[{&(0x7f00000001c0)="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", 0xfe, 0x100}, {&(0x7f00000002c0)="9a6d316f44234a7b9d7ff57dbc77bef31c942e892579487dc63765d3811a7c2000a1543093a6391e21048ae2d79bb8d20d12a95db962905ccc424c06c107f2cbc373688dd2aa358f24ea69739d6ae395d7555776f3385b5826bb2dcadf8254d63813564571213870d005f9169ac0a30e6a5c869d295b1e812e325c4e7ce34d4aa50e69913ec8b1ab2bdb23825522e25552d7a98ee7ae0100f53cb6cf8aefb513fa458b8f41", 0xa5}, {&(0x7f0000000380)="0c8f2ffc2ddd8b2634d8f03b79c5365aa7a9025fc88e7da2661b75aa0b48ad0dd354e17017a1e7c76b91fa1c2165ad769262fbb6f921c19aa11ba257cae56b4839f9f4443f8ae844b205d66afbdc55adf036366b110367fdfa296a3014744bd3eec9f0d5807ad47bc8ef8b12206480488a7a1ee8e7d4be4c502a34cdedcd30208f8d50d1696ef42f00e38861d7088494d62371f6e2bf78e7f79275fd8624636fd6dbc5baf5be7659c9c9ba34261e46d653c6214f2b97aa76c85d1ff9f5b6f06bcae111a4998e1f0ceb0a2a5656d8af76e7d177ca54609abf0c7e1dd59c7a2d4fc60cd8fcc9728ad558d8be97c143673d", 0xf0, 0x1}, {&(0x7f0000000480)="5a0c50492a643a2341571f1ff4a60ea617ffe10dfb27b6b44619cb0df174c9d12c13fd2baf06160dbe84002b44cca8dffad4b5260daf0b8c42761f6ada9bc0fc60f7e855233fb042aff4f6fae32682c974487e0262da8a688db5a0cb27ed13439d8a50d7edadd50b891d80462b0f520e53006ae6131270eac5", 0x79, 0xf2f0}, {&(0x7f0000000500)="a72fd2073f8798ecfe9ea467c8c6cb3fc3fc46b62675ff07ad5b68dea26e6bed88af54b541c556063b6729ae3b463f586a090ea451cab4815f28272ebb7d144458b31c9b034e12ba3ee35a20cfef10dae6305a89728547021246eebeb2b325284b5ae1ba8612a0a484ddfdbd53219ddbea17e880ef57b9d79b7031005c7f8d67e2822bb604a8fa370a29d3ef6c9268a970e5910503c3abf55808fc5317393851dd0121cd4f07bc", 0xa7, 0x2a}, {&(0x7f00000005c0)="5ae2636589a2d24bd053353a1ec2866152e9d28de1645975bcb1454ee30ef8e84a5ff580cc9eaa09f529b1120a8bc1844f3dd77b741ce49cf904783977757a8c50b3e32fb2321fe00eba8df4746f7615f15bbf7dbe19c5f45a3b6399e0569815c90cdc4899a2834ee6205f3e08e369220aa8688fef206a44463843ac90a845", 0x7f, 0x9}, {&(0x7f0000000640)="fbc1173ecf27a864b0706cde54e1921bbb8902dafca2f7aa092765bc3464257e6cfaa112a2a671fa24ddc8b3617b19ffd6186b803a1dbe953c87ff54df7690aa8397864355e4b5e5969a610e7b5856cb1c74cd5ae68bc9253ac18e01c9020acbc94a63a1d34ab7cab2629e26d5fcd0e5d4508fe627093f21", 0xb0, 0x3}, {&(0x7f00000006c0)="217e872dd7e8ba737aa5061bd410b32c957bcf1443dd0b92f6811e22955010a483972df1352a9f5b3457234d858337d7ecbd9faf04cfc811eb98bdac05f21d943f2ad611c2d6a54d75a1299366c0a2b4b35d64acb79a87c92a9583c5fde702f3dd84a08f1a38c490c8abbb55794f8c3d909c667469e9d48687e6cbfd9410f54490eb91325a7be136e17f3283bd708e1f26bf27d1694d2328134ac482ddc81ac6165e5506d44fc040f052b05637c473ecbe6a6b99", 0xb4, 0x3}, {&(0x7f0000000780)="da0f6a87f019068373d35fdd8b2a82c4365309203be7b0bfffb0f2902af43e01a36fb3cd230b4d7c9cf488a109dd6a9275aa9ccc501c85072dbdc2a33ac8a59892f8b0478217e7e6967da4d9bc6449afe98a7037aa55c503652b953cdb10558f1e0455ff0ae56d173f4643398a205e64a04d4b54b99fbaa257c5259732c4ddc808de8b86fa83e215a7ac57e6024a3d76becdd241255118a1240d29d22d7ef5fc0bf6cb4a4587fe2eb7e2f1b84a508be76c978ac9664d524151d4691cd389b1f61b4af91c2ae79a928f267bf45f480b3509d5108512292de496aa93f357b16ecfe566ed22c13f06", 0xe7, 0x5}], 0x1000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:08 executing program 1: ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 1: ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 5: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba00"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:08 executing program 1: ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffe}, 0x5a) r1 = syz_open_procfs(0x0, &(0x7f0000001540)='projid_map\x00') r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/vlan/config\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001600)={0x6, 0x4, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xa26}, [@call={0x85, 0x0, 0x0, 0xa6}]}, &(0x7f0000001480)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000014c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0x5, 0x10}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[r1, r2, r3]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001400)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="183b0000030000000071431751add692ef602c5c00000000000000"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xc, 0x80000001, 0x3ff}, 0x10}, 0x80) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 2: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffd}, 0x20) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/130, 0x0, 0x82, 0xfffffffe}, 0x5a) r1 = syz_open_procfs(0x0, &(0x7f0000001540)='projid_map\x00') r2 = syz_open_procfs(0x0, &(0x7f0000001580)='net/vlan/config\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001600)={0x6, 0x4, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xa26}, [@call={0x85, 0x0, 0x0, 0xa6}]}, &(0x7f0000001480)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000014c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0x5, 0x10}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[r1, r2, r3]}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001400)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="183b0000030000000071431751add692ef602c5c00000000000000"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001840)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xc, 0x80000001, 0x3ff}, 0x10}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000013c0)={r0, 0x20, &(0x7f0000001380)={&(0x7f0000000280)=""/4096, 0x1000, 0x0, &(0x7f0000001280)=""/249, 0xf9}}, 0x10) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) 05:45:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x840) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x106, 0x8}}, 0x20) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000940)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000800)={0xd0, r1, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8004000}, 0x44004010) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000940)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000800)={0xd0, r1, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8004000}, 0x44004010) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, 0x0, 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$SNDCTL_DSP_GETISPACE(r0, 0x8010500d, &(0x7f0000000040)) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x4040, 0x0) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f00000000c0)=0x1) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/130, 0x4d, 0x82}, 0x20) 05:45:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000940)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000800)={0xd0, r1, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8004000}, 0x44004010) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 05:45:08 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) 05:45:08 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf, 0x1}, 0x20) 05:45:08 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) socket$nl_generic(0x10, 0x3, 0x10) 05:45:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:09 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:09 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000640), 0x6, 0x20200) 05:45:09 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:09 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000600)) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], 0x0, 0x7b, 0x0, 0x1}, 0x20) 05:45:09 executing program 1: openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000b00)) 05:45:09 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:09 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000a000000000009030000000b00000009000006040000000c000000e40000000b000000040000000b4b0000050000000e00000000000000000000000000a0000400000008000000080800000000000000d8000001000004d60066a1ba000000ffff"], &(0x7f00000001c0)=""/223, 0x7b, 0xdf}, 0x20) 05:45:09 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:09 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:09 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:09 executing program 0: execveat(0xffffffffffffffff, 0x0, &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:09 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:09 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) 05:45:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:09 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) 05:45:09 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:45:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 0: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) 05:45:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) 05:45:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:10 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:10 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) 05:45:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) 05:45:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 05:45:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:11 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:11 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) 05:45:11 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:11 executing program 2: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:11 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:11 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:11 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:11 executing program 1: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:11 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:11 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 05:45:11 executing program 1: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:11 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 1: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:11 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:11 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') 05:45:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:12 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 5: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 5: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 5: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) 05:45:12 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:45:12 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:12 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 05:45:12 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:12 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:12 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:12 executing program 4: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x2682, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, 0x0) 05:45:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) 05:45:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:13 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='-\x00', &(0x7f0000000080)='\x00', &(0x7f00000001c0)='-.&\'\x92^\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='-\'\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='+)%..[.\x00', &(0x7f0000000300)=']!@%++$%\'-$/&('], 0x400) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'gre0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x7800, 0x7800, 0x800, 0x6000, {{0x34, 0x4, 0x1, 0x2e, 0xd0, 0x64, 0x0, 0x3, 0x2f, 0x0, @rand_addr=0x64010101, @local, {[@lsrr={0x83, 0x27, 0xc2, [@dev={0xac, 0x14, 0x14, 0xd}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x30}, @rand_addr=0x64010100, @loopback, @multicast1]}, @noop, @ssrr={0x89, 0xb, 0x7e, [@dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x7, [{@loopback, 0xf6}, {@remote}, {@private=0xa010101, 0x1}]}, @timestamp_addr={0x44, 0xc, 0x82, 0x1, 0x9, [{@rand_addr=0x64010100, 0x1}]}, @ssrr={0x89, 0x17, 0x33, [@local, @empty, @loopback, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x44, 0xdd, 0x3, 0x3, [{@multicast2, 0x5a8}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x7}, {@private=0xa010102}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0x7}, {@rand_addr=0x64010102, 0x81}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x80000001}, {@empty, 0x80000000}]}, @end, @noop]}}}}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 05:45:13 executing program 4: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000b00)) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000800000000000000070000001db42a0104000000950000000000000018220000", @ANYRES32=r1, @ANYBLOB="0000002201000000032b00000800000085100000050000008510000006000000385204000100000085200000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x36, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x401, 0xe91}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r3, r4, r5]}, 0x80) 05:45:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) r2 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r4, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xe, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@alu={0x4, 0x1, 0xc, 0x4, 0x1, 0xfffffffffffffffc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe5, &(0x7f0000000280)=""/229, 0x0, 0xa, '\x00', r5, 0x25, r2, 0x8, &(0x7f00000003c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8000, 0xe9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r6, r7]}, 0x80) 05:45:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000800000000000000070000001db42a0104000000950000000000000018220000", @ANYRES32=r1, @ANYBLOB="0000002201000000032b00000800000085100000050000008510000006000000385204000100000085200000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x36, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x401, 0xe91}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r3, r4, r5]}, 0x80) 05:45:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000800000000000000070000001db42a0104000000950000000000000018220000", @ANYRES32=r1, @ANYBLOB="0000002201000000032b00000800000085100000050000008510000006000000385204000100000085200000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x36, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x25, r0, 0x8, &(0x7f0000000500)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xa, 0x401, 0xe91}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r3, r4, r5]}, 0x80) 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) syz_open_procfs(0x0, &(0x7f0000000440)='smaps_rollup\x00') 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) 05:45:13 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xcf}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xef, &(0x7f0000000300)=""/239, 0x40f00, 0x8, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0xff, 0x8}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) munlockall() 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xcf}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xef, &(0x7f0000000300)=""/239, 0x40f00, 0x8, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0xff, 0x8}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) munlockall() 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xcf}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xef, &(0x7f0000000300)=""/239, 0x40f00, 0x8, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0xff, 0x8}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) munlockall() 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) 05:45:13 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xcf}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xef, &(0x7f0000000300)=""/239, 0x40f00, 0x8, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0xff, 0x8}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:13 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) 05:45:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, r1, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r1, &(0x7f0000000400)=""/26, 0x1a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x2}, 0x48) 05:45:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x7ff, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r1, &(0x7f0000000400)=""/26, 0x1a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r1, &(0x7f0000000400)=""/26, 0x1a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:14 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x7ff, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x7ff, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x7ff, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:14 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x7, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:14 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x650, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x650, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x650, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:15 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x650}, 0x48) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x8000) 05:45:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:15 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r1, &(0x7f0000000400)=""/26, 0x1a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:16 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xcf}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xef, &(0x7f0000000300)=""/239, 0x40f00, 0x8, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000400)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0xff, 0x8}, 0x10}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x0, 0x0, 0x1040, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:16 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:16 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 05:45:17 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') bind$bt_l2cap(r1, &(0x7f00000005c0)={0x1f, 0x2, @any, 0x447, 0x1}, 0xe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_dev$usbmon(&(0x7f0000000680), 0xffffffff, 0x202040) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r2, 0xffffffffffffffff, r3, r4]}, 0x80) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) sendmsg$ETHTOOL_MSG_RINGS_SET(r5, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10}, 0x48) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10}, 0x48) 05:45:17 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001540)='net/icmp6\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_procfs(0x0, &(0x7f0000001600)='attr/current\x00') r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001640), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x6, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x7}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000001440)='syzkaller\x00', 0x3, 0xaa, &(0x7f0000001480)=""/170, 0x41100, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001580)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0x5, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001680)=[r2, 0x1, r3, 0x1, 0x1, 0xffffffffffffffff, r4]}, 0x80) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f00000013c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0xa, [@func={0xf, 0x0, 0x0, 0xc, 0x5}, @datasec={0xf, 0x4, 0x0, 0xf, 0x2, [{0x5, 0x6, 0x8}, {0x1, 0x2, 0x4}, {0x2, 0x5, 0x2}, {0x5, 0x10001, 0x401}], ' s'}, @func={0xe, 0x0, 0x0, 0xc, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x33, 0x1}, @const={0x5, 0x0, 0x0, 0xa, 0x1}, @ptr={0x1}, @restrict={0xd, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x61, 0x61, 0x5f, 0x2e, 0x61, 0x61, 0x2e, 0x0]}}, &(0x7f0000000040)=""/115, 0xae, 0x73}, 0x20) ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0xc, 0x0, 0x0, 0xe, 0x1}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0xb, 0x3}]}, @func={0x10, 0x0, 0x0, 0xc, 0x101}]}, {0x0, [0x30, 0x61, 0x5f, 0x0]}}, &(0x7f0000000340)=""/4096, 0x52, 0x1000}, 0x20) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x101302, 0x0) 05:45:17 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001540)='net/icmp6\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = syz_open_procfs(0x0, &(0x7f0000001600)='attr/current\x00') r4 = bpf$ITER_CREATE(0x21, &(0x7f0000001640), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x6, &(0x7f0000001400)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x7}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000001440)='syzkaller\x00', 0x3, 0xaa, &(0x7f0000001480)=""/170, 0x41100, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000001580)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0x5, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001680)=[r2, 0x1, r3, 0x1, 0x1, 0xffffffffffffffff, r4]}, 0x80) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f00000013c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8a, 0x8a, 0xa, [@func={0xf, 0x0, 0x0, 0xc, 0x5}, @datasec={0xf, 0x4, 0x0, 0xf, 0x2, [{0x5, 0x6, 0x8}, {0x1, 0x2, 0x4}, {0x2, 0x5, 0x2}, {0x5, 0x10001, 0x401}], ' s'}, @func={0xe, 0x0, 0x0, 0xc, 0x1}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x20, 0x0, 0x33, 0x1}, @const={0x5, 0x0, 0x0, 0xa, 0x1}, @ptr={0x1}, @restrict={0xd, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x61, 0x61, 0x5f, 0x2e, 0x61, 0x61, 0x2e, 0x0]}}, &(0x7f0000000040)=""/115, 0xae, 0x73}, 0x20) ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0xc, 0x0, 0x0, 0xe, 0x1}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0xffffffff, [{0xb, 0x3}]}, @func={0x10, 0x0, 0x0, 0xc, 0x101}]}, {0x0, [0x30, 0x61, 0x5f, 0x0]}}, &(0x7f0000000340)=""/4096, 0x52, 0x1000}, 0x20) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x101302, 0x0) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffff"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf25100000004800018014000200696a762c616e31000000000000000000140002006c6f0047000000000000000000000000140002006970366772657461703000000000000008000300bcb7ae3108000100", @ANYRES32=0x0, @ANYBLOB="08000600000000000800070007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24004004}, 0x1) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240), 0x2, 0x400) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r2, 0xffffffffffffffff, r3, r4]}, 0x80) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) ioctl$MON_IOCH_MFLUSH(r6, 0x9208, 0x5) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r5, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873720000000014000200766c616e300000000000000000000000080003000200000008000300000000000800030002000000080003000300000008000600a823000058000180080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100d52b6e08b24d0707e62ced84aa6bfc", @ANYRES32=0x0, @ANYBLOB="0800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002006970365f76746930000000000000000008000300000000001c000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="0820030002000000eae1ef35ded9863fa788e4df017b2aba36a58a9e35ddc6be84dc620096a8fc3ff6847e286038c99d63513e9166826b9fee77c401bf8632cc27fd8fd366b4945c82be085a0913fada8b1d663207c18849f2754be16105f2e5e38d9a807b903a6e250bc55cac985872f6f9b4ed83f0e9c8347d043ec96d03bc9bf66126"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0xffff0efd, 0xfff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x1c, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004000) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @empty}}}, 0xa0) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) prctl$PR_SET_NAME(0xf, &(0x7f00000017c0)='$@\x00') ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) prctl$PR_SET_NAME(0xf, &(0x7f00000017c0)='$@\x00') ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 1: ioctl$SNDCTL_DSP_POST(0xffffffffffffffff, 0x5008, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x7ff) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r2 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000240)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000001c0)=0xe, 0x80000) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:17 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x26}, [@call={0x85, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x7, &(0x7f0000000140)=""/7, 0x41000, 0xcad57c97853d0438, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x6, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r2, r6]}, 0x80) 05:45:17 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="ee107831958decbf928134e9f15df9d44451ddfa56243ac99d997b3377685172236c9b515c3a148f3980a30c66a2212125b6bb6c7442582d6fa74a21bf20f0090434cabc5d215924126247101b12b22d288ad725fe73ae2d416c5f2f3fe0b566e979f5c331934d06ebfe9325e122c528bea897aee4f4c4e97422f4b04241be03086a235cf899dc35ded1ed8fa36faee52e266517101660a03d33b402a016ccd5964da2e6ec9e14832ad3c79968e713f517f845f131369add7459be83861aebcedb31b2f082390f659e6d90223ee22553c26c26b9121218b67c2514d1c50c0eb9cd19cd1e0d3032ef450395b9a2190f7246e76e6fcc2f722889f4b738d7eac989a0f03a9ac816ee0c6eeb804bc062bb6d902fbb723b207c7176ccaf2381bccb71afdd2ae030ff01489191b44baee2db05816433bc255befc5eb5fe2d99ae81710694b239de3efc593e2e1829f2059d26ec362fde66990759283b369daffd257b9155a1631240790f1edc064a861fed8d9e1702605b2e4995908b726fa1da5020037b355fdfe5da58738a1c56eaf5b6866ee75dbf1eb103f1726769e03fda2b3c3ae7afbbb88448ac1036274f1d1967d9e786156c1f57d9ce3bf8e896cf8449f2830c1cd09e533f064a6d657ff3be0327a3ade17ac5a05deda5615b940eda16d3f3ba2fa8eb7a3c866dc9ce9a41d3a2ddd93ec5358e96bb10a2f0e5e24f520615ca9a0c0cee07705dc89764c75486187e5bf551bd191547715297aa6a84b2d8c01eb551220b48ca4ff6850b280d8167589b9cf54c6c9d8f369e84dcafc5494025d904a9ab01dbf3060e27dbb2800a281ddd3842a76e859c5ad71e08b6f4fe800c17f3c94937355500813b89d5a38f9a69b0af3546d565fd12e8a69f3dc11b270fb457dc1833fc673d3daabc48d9c3ec727b7f21fca40578a142e83c2858e9f646c9bb93238134435517a6d87b915b0d0dc4e859ffa2f3672cc2e6292b3d187fd66186e248754438488e152b36a8ebd6c5ed0c870b1fea91c65869b879941f9e33be55e3b1045373abcab44a45cb09b869c66a1ba0aa41843059a909e89bae90fc42b35d33ff7fdefdcdef7a7c60b09157854ef92f2047a55793548fad2903330631672459d0aa0b91682b99de48a71804e6d110f2532cc4320257c22788ce7d042a286ee61f6fbc8396d7e066c1663064945feb966df90e7b9549ab69212c92c22cd0d1ef38dd6653398f22b4bd20b5590f03baed0b3efc6c6d4c2db1e17036a567934d3856c57a863bf3eb4a2beecb8f15f783ae7de2f8c5f32bd855f75b34f3172da8f03b906eb6df6b022e3df610e28cf999f9bc989d6b805e348868b6d69e63665b6c402bf27608c920bf3b1aa60dfd73f73d76cee9d8c3f084cd11090bea31226c66e0fa33055064c0a36f5aa5fd1b1c0502620854f60324947a2ff635f3416625c424f2fd946680e81701f3888882681f6c8bd94e1af6a6763a00aab31463a22f87726f4dffb508d4735b3c3ae6a422e1ea0a3e87b102b3cf98a85f8b1bcf0689fc7c8fb331fbd0e213fb2bac4632ef6dfd7cda806f748cba2fb8d77c0b0e906cc9adee46c712fa10ffff49aaeec77e8dfb04705ec8eae3e9a77795e0c41e6035b635d57ef2f178642b4358c8d2325cdfa9d5e5fc190b0893b0936c14a483cfa2858a60e8f6edceee58502f79022b59d51785c7eb35c4d812072ccdf228d64642c12f11991ea70a23e807f320973d98bd20d24d3edb2c9806f1ca622a5a55d98c3b39ddfc277380395e910d7b8759632f106c699b75fd8c9d199d65916fa8be4f8636a56d6c9ceb9035d53cf3faeb9b65c8b78c1fb08a9fbc153f71d9fa0f64b094b0c411cc3021ed1f15d760a020faad4f72143596697d726892e96fe93c97d3e64d7dda42654d099a9260c94185dab7344df0c01ceaf5c97dc28c27fef990135d6d5bc84e4efef91ae05a3f0159f7cf8d114335ea2b92974a03224fec55ebc86e951001b6f484b2224e8faac7a52f5288e30a07814ac39fecf9b05ce30aa132ff19926992e0eb6f6526d3c0a8f47f56108e88ec8e4089380f84f2f195e30d391de4fc1b24c4e79ccf27d226f13c91334e002b7e065ad4cc15684e98882a8ad103e64cc36acf17e222e085f13051e9780a1e2293ff535be630a9d5f082b502635aa0cb107ae10faadb0fae482e6932a80c1ec410edcad17408fcabdb67514707a5e4ba021889bb4ef73fd57fc76e06a227539a9ce5ccb4fefe2821b1a1c28d519e39a519860b2a20d1b338d68b05419a35fe9263ed7709c73980d8640ab7ab9edc273b95369dc31ccb715b14aa5708fcaf36ab66bef4b528f9c5a36e92a3898f31fc5f42fae2f015e2763e18f40f37d5c29d2cc1047ab41d6a81d9ab69de3f2bcf08964bf3523ce79b18a5f69fd268aebfd999f1ee1f9b1b283c92eecf495148f3fec55fff78618927592fd1b90470f84d8e33b50618be9f045518a63561625769138f1e7f7ecf001f7e3120dae50a34b6e9e265de7362d8858ef52a74f0046ef27b072981be31a4365022d82bec9a19e9229c00e542f316c79901d72e64ac03c71db7e2b7f7fec98c0c1d3309001e77d9e323853eb080ad19595a3fd590fa31dc054fb210760603800ba3a91b14f19dbdf7d52b17129833be3754a87f3944c7d0eb5c0ef0d9174f9c6684c34fa61d74566846fc1fc659e84c3d5b45141f07adbd63587796d0d1d44ed136438f8d50c8f14621f5ac785568a8dbd627458bd32e1330777f3651744ebfcb4b1b2134856369cfd8b326e91bbaaa273094f02ff5c61c0ba1e830dd18a60b826ba438c708ee5a4724af8b821fab8c59990c3794dcef9d5d9ffaa98adae0ed93ffd04b54c3eb3a731b1069331ebc09cfcb142b8c28094e49538546c9d2c7ff695fae2ef45614ed8b57857a0af641392941b8cb3925a80ee54dc0c5dcefb24e99b00313bfa7ea03e29bbe3d9cc40421daa4a56d93e1226e26b69e5446a2a38d9f4a9a91bf18f4500e993f156c6c36bd55fc365e2d785c4e8918400c26bd63436c8f7301b1d140e694fc49c9d24d103c4831ec2496bdc369007a6f75db15411811ad22a32ab12ef148004e345bdfdffc6092d8161ceeeef2a66fa800c699372be1a2612c9716191ca59464e63018bddf882f55c2ccd3619aa5550f50ea05d72bf53beaec092c94fcc77260dce5f6127bbee10e57b2564adab99a2f928b980211ca629d1b6f7a9f8cca2ea4656da83562b73f69be7a8092f3d0bf1e62961ab9c4afc65af6942ad7d2e83b31a4d1e50b0492482ef7703d5a03b2eb470ddb941d9a590afabd3c316336329a43d9846be417573fe5647607110d93010b3d0c9cd38252fb8f9a67c8981c509c8501c72f383282c9cf9a961e0b6f57282afd47109286d03e2812f837617eea89fd930f4d850c4543ade7bdb5a85e9e87b441c89bd92c598b4afc330e97a68c95a92ff6782e9a724182c39d6c9d24410a20c43a6f5fdba009aded17baace6d7c186ca990a477e709a21aa716ee6f478b4954e0d8fb524545b7f0be03129c9e19174c5aad24214874a5ff9e3a6da08553f1941beca34f3a202709ba88b5780fcbf3697e7e440ddf7f1b818fe9d8ddff43954f5e9bc6800bdd2509e33edea52cc83d6078e40c4d10534b68aec5a36e374c06c1ebd87e08d703680e6005e87a1386266c91d7710773365329f8a2bdeb0c62d43deb465598817378b4a2861418428a36a3e5bc896a34d77270bb26116d16fd5d35ee48f1e918220e8b3e0ab0b96b6dc9225f38849cbc899095138904646bcab5fca72b18c2ebc58575d8fa7c99aea5cc55105cccda3c10ee8eedd556cce6d1ae9ffd2aa05cde50cd331dc91bc9bcd801f8d20612cb5d7d667db65640925ff17ddad880c5db3fde3abd38bb2458bf0b28e779b2dbc0d66408005c9a39a3a4441074feaebfa53c1a9ed7abb12982218937365118ec6a5867a289d7a977e0df0a4b00d211f003280592e4f3f07ba3364692f951e978bf03013a52d6195788fb7cbe4c00d657cba1ce010cfb781570e55d5ad5204dff39f7e7e8e334c4b29413b67f4e2612f88ead9d070a20a29a898ef7a92a186e9d800c770e605cabb55223337160049059d3669a86dbb369a33ff0ca17ab533ff93a0e9a11858e14abece720dda7dca0122a2d6c35635929bc678d10084d43666d8e36ea1bcdd64a0a55c9bf589c1ede94f109f509940a76561bd5af22ca11f0adc8887b497795fe7f103c3e88d66adc2f80cf40fe95002c6e2e3bffcaadceb0d1892f79bdb59992410e403b5044703644a1598b14cb304615a26cfed70fdc819766ca5446d8ae75846d92c3957add4616a66bf34673058177e45df776f5907788d80dca1f39fae160c22e809a72d14d3cbe05baf1f856e9b6f5a212c918f924f79f4046cea04668199ac3d6f175c1c49c3a591ff0a36bea3dc15f071ffecd6b20d70ec91e96f3f97f99cc234707c5dfefa85e3281f29e3b51e21b6193e94410de6927b20335a157d7da8cf68b0384d147d03d76a9718b778ebf720e8c6f7e4ea8866080962e061615c9ca624ef39398feef02af9ebe53ea624de000623d58a848c9c97c65c5bb1ce36d1933e4101302dac5eb9707888145b8eb7e0661e70fef78ec095fd5121f0590d9f8f0fb72d9e773bc4fb5ef95b0162cf0b40c9061a13d1081b1471901a18713fb741a9ed4397ddd76b7988764a1c93f414594bc6881ef127424d170fdca4513d7d6dad14e765553c8b7478858f51f3a20ce57671324ad0e12230dba4e92908c5a3ab287c8c6b9ca33bade1e7a526feb3a23fa0c428eae2ff4a1fba9c74ce3ca1cccaa07f210be6f48dda0ae11866e9cb6e05f1c98f13e9ef2aa9884580cf6c44c5ed9ae93bf9cdc7f3829befeaeb6c7bd38e6ccac50840b3fb72659de363e0ba275f25db38277dc5523688bb7d0a09fa3c0748d666230190b671110fb6a093c8680516066ceb17caf645058182f5e5bd33731df374f0c3de860fd1d969c2d32a00b5cad3e882119a5593ec32f3bdb6c1ee9003d3fd84776aaa76a82c6dfba6cf6af0ca9af3f362e1a76bbdc2478f8a2e9ab96e5afc5e74665f2010f1c6220da7b80cd6a2644b16fe1b42267712938734ed6a088a0ff47df824174fd22ea372e7a5c1f9bd849684e679d37d9eb94a732f85911c264495e1f958801b7ccf0d7dd7efeb975e989a4559ae8e86fae49c4c8271342a0986a98967c13fddaa9f3e731cb367bd1ede62dfca3ac9b90db41c3ec665e28f1a7b8b73c1cc607ca0566c7508a93295c8e70ecbe655ea8c9c5c873ff6aaa95f02b1fa24fea1f42fe7fb0503a6cc7077b534551d9773de803af36bbeb58e8143aa577ac1ba3616785f96f0639e8cac335640997dd7a5e0a6ea80d2beca5ae98cb2c8c30a87a26ef6dc94551a5378137f4d1d8d73678594529d6b042084cf6114a02578800f796db8098405b66bc1c8fa7f9b2a0ad31fdf98991621b0b5882e2b57916bd9d79408a358776ba116c3fd213618872032e373109ad381728e287ec803d155aea00afb7387a72a8a3a713f7e6fce226d4d72d0f6558962f182312ba21f7d99b19796c58e539f35c9c9e01e59016eebd604dc49c55d0c82d0700229e8ef69af5401fb067ea226bce1e2719e6f0b76082ebf6fbe5821c7452027485a06cea3c9fe16061086f15a9928fcc15b18800e98eeb2c8bcd5385ed4d071acbe3a06d91e443830fc24010a5fa074a3196a8fa42532c53cc206533b036c372cf966f85e815d694a1b8e8a4e6", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) prctl$PR_SET_NAME(0xf, &(0x7f00000017c0)='$@\x00') ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008010}, 0x44080) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/146, 0x0, 0x10}, 0x1a) 05:45:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002006970766c616e3100000000000000000008000300030000001400020076657468305f746f5f6873"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:17 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:18 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008010}, 0x44080) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/146, 0x0, 0x10}, 0x1a) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x26}, [@call={0x85, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x7, &(0x7f0000000140)=""/7, 0x41000, 0xcad57c97853d0438, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x6, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r2, r6]}, 0x80) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008010}, 0x44080) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/146, 0x0, 0x10}, 0x1a) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x26}, [@call={0x85, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x38}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x7, &(0x7f0000000140)=""/7, 0x41000, 0xcad57c97853d0438, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x6, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r2, r6]}, 0x80) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008010}, 0x44080) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffff"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) 05:45:18 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x7b308) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002006d6163766c616e300000000000000000140002"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 1: socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffff"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:18 executing program 1: socketpair(0x0, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffff"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:18 executing program 1: socketpair(0x0, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff184700"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf2510"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)) 05:45:18 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff184700"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:18 executing program 1: socketpair(0x0, 0x1, 0x8001, &(0x7f0000000180)) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf25100000007c000180140002"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:18 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 1: socketpair(0x25, 0x0, 0x8001, &(0x7f0000000180)) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff184700"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 1: socketpair(0x25, 0x0, 0x8001, &(0x7f0000000180)) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x2, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') 05:45:19 executing program 1: socketpair(0x25, 0x0, 0x8001, &(0x7f0000000180)) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 1: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000fcdbdf2510"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x2, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000001500)) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(0x0, 0x2, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 1: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 1: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:19 executing program 1: socketpair(0x25, 0x1, 0x8001, 0x0) 05:45:19 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) 05:45:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 2: syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:19 executing program 1: socketpair(0x25, 0x1, 0x8001, 0x0) 05:45:20 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 2: syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 2: syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 05:45:20 executing program 1: socketpair(0x25, 0x1, 0x8001, 0x0) 05:45:20 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:20 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') 05:45:20 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129bd"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') 05:45:20 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x90041) 05:45:20 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:20 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:20 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @union={0x7, 0x4, 0x0, 0x5, 0x1, 0x5, [{0x3, 0x5, 0x3}, {0x10, 0x0, 0x8001}, {0xd, 0x1, 0xfff}, {0x8, 0x1, 0xfff}]}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0x4}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/110, 0x7b, 0x6e, 0x1}, 0x20) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:20 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) 05:45:20 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:21 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x90041) 05:45:21 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/110, 0x0, 0x6e, 0x1}, 0x20) 05:45:21 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="0001"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:21 executing program 2: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0}, 0x20) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 2: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x90041) 05:45:21 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:21 executing program 3: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 05:45:21 executing program 2: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 3: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x90041) 05:45:21 executing program 1: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x90041) 05:45:21 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:21 executing program 2: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000001780), 0x0, 0x28100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:22 executing program 2: syz_open_dev$dri(0xfffffffffffffffc, 0x0, 0x0) 05:45:22 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000001500)) 05:45:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 0: syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 2: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}}, 0x8000) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) 05:45:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 2: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}}, 0x0) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 2: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: socketpair(0x25, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:22 executing program 1: socketpair(0x0, 0x1, 0x8001, &(0x7f0000000180)) 05:45:22 executing program 2: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) 05:45:22 executing program 2: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB='\x00'], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 0: syz_genetlink_get_family_id$team(&(0x7f0000000100), 0xffffffffffffffff) socketpair(0x25, 0x1, 0x8001, &(0x7f0000000180)) 05:45:22 executing program 2: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) 05:45:22 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) 05:45:22 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x3, 0x3aba43) r1 = syz_open_dev$usbmon(&(0x7f0000001780), 0x2, 0x28100) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x7b308) read$usbmon(r0, &(0x7f0000000040)=""/8, 0x8) kexec_load(0x1, 0x8, &(0x7f0000001680)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1000}, {&(0x7f00000011c0)="a73e69e5f565ac0e9e5602f1e29d89694193e0edc9889d577818b4d3376448eef4aff69c2f9eedfcc7f606ef880d2e1a8f26be95bb17b42f203d9b2f63f6b803b97062e3d9fb6c7c12eba9fe1cab99baf7e968a40dd7ef319cbf73447460bc8bdbb17315914e3df9a7ace3288cc7d83d2cc87970ab98f07de165a8487ccd9bd3ca0f7167ab723f89858f5dce40a2c1c1be4007f7a8631fbe76d85ee95cde5689527fca9ec77739db4b3915801873f8b2b1", 0xb1, 0x95, 0x401}, {&(0x7f0000001280)="b6b8da71b9a20eb54af2997f0bfe296676476c1f183d959dd0869b8d88f01f9f9d82d392616673223e60b27e70f25b9625ccfb00c1579c2b24e072a77b353c6a7eb118e68478f788376beff253a50de030578ea351bc6c2761e4a8db681f868c18774ecc46b19dd8fcefc5cf7799cccde864b63084f9612260d18de36ae7189dc29c52ab3a6aaf805cac6d43aa89e625ccfec2071b5a33614eeac2df7676f0c291a82c70f004e93933f448733c0a3c3c231b0cd9d1aedee4f2594c905a89c061ce8fe385c92d7aa6f7f72346c1bc57d05a", 0xd1, 0x19}, {&(0x7f0000001380)="cb6ef6572fda30509ffb8c3249e90b958f04c4276d45db6f1fd72d60ea5745835e0b48a10c75e2bb4ff26390a80aa6222f0aaa157610bb879ecc39b0facdcf9a7f363f7574203bdc24936b7bdbad38570ac20850f1b97a4c63d99fe39d756bd7ddb39a1efd7547f7081661805407dd3dac802743a7b2992a7f8920fada1fdf7361661ea495be1d9f0c95f3c8eb5f78e2c69dbe725516774745d33e43f12344ba3101989a7aa35490d0a849e764770ba00142a9b6200dd276fbcdff15f40f8c3b8d6336e3b76dc769d1b750dba57dffe031567196", 0xd4, 0x0, 0xfffffffffffffffd}, {&(0x7f0000001480)="30ec1ab73b77bfaaa5dbf849d59e89a34f888d249f9c7d5d9be39227863c79bf1041bd24a47e4067573e940c1f0c9732cbb5d79b6407c961ed5f6ed0a6a9a597714078dab8bb83d416cbba56edb12f83af2684b84da466609db49bab0c75a67aed3e7c11c1e94f450d2e2907f09d8f9059bf3e371ed83ff953fcf254d8ba04c2aa898ca61869f255979def1ffb106d1e894fa7eceffea24281fda5f2ba1e50aef4655a99fd4ac04f757223a005d94945eaa9d33ebdd353bb7093308050dc7f187f497050d3bb8a9986a685bdb3e37edae0fefc995cd13f80b5b01bf0629ab4761fb25a8f3a99045aae66bdf268991d6d6ce5f2d93574d9efcb", 0xf9, 0x8, 0xfff}, {&(0x7f0000001580)="9667585217b73f19a451e294a34b3c35d9e20a7769dcb4bdb62666ecda385f094bfeba4751d6d210239f8c0f04c53ffeb2a1b54101748295fd5ac474e1478c68f10395e1a7e20cb1e6e2ba8c4d51ab669968c770184bb0767191523f0a09817b1f0c5794d7e16dc9cd77d52e0900e4ac2ea2311b308b0468715bff50166d114e29def4df2f3b3ee34f94c76fb0faecf3d8112dc5fed9774193cb29d1f1b362d1b9f135e48d4e", 0xa6, 0xffffffff, 0x80000001}, {&(0x7f0000000080)="1e6ed474c87b2a1e475ef8b0774edb0f0c2d893489da879a62094d08ee73258a2332", 0x22, 0xffffffffffff0000, 0x9}, {&(0x7f0000001640)="6ff73fd861f646f60242d4c384e3cf609811480d7fd38b8a88975313e684be7e4b8bbca7ca2ab71bf95453eedc3b9796", 0x30, 0x1, 0x9c2}], 0x80000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 05:45:22 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) r3 = gettid() ptrace$getenv(0x4201, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x3b, &(0x7f00000002c0)={0x38, 0x6d, 0x8}) 05:45:22 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000180)) 05:45:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}}, 0x8000) 05:45:23 executing program 2: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r6, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r5, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r3, @ANYBLOB="000600"/16], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r6, 0xffffffffffffffff, r7, r8]}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000a40)={0x924, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x1, 0x8, 0x7f, 0xfffffff9}, {0x3ff, 0x7, 0x7f, 0x4}, {0x8, 0x7, 0x0, 0x4}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x884}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x3f, 0x81, 0x88}, {0x3, 0x0, 0x7, 0x1}, {0xd550, 0x9, 0x7, 0x4}, {0x6, 0x30, 0x7, 0x8001}, {0x401, 0x1f, 0xed, 0x7}, {0x4ba7, 0x11, 0x1f, 0x8001}, {0xff, 0x9, 0x76, 0x35}, {0x6, 0x9, 0x67, 0x3}]}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}]}, 0x924}}, 0x44085) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) r3 = gettid() ptrace$getenv(0x4201, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x3b, &(0x7f00000002c0)={0x38, 0x6d, 0x8}) 05:45:23 executing program 3: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/117, 0x0, 0x75}, 0x20) syz_open_dev$dri(0xfffffffffffffffc, 0x3, 0x90041) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000001540), 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000014c0)='clear_refs\x00') ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000001500)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/llc/core\x00') r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0xffffff21, [{0x0, 0x5, 0x79d}, {0x10, 0x4, 0x4}, {0xf, 0x2, 0x2e5}, {0x7, 0x3, 0x7fff}]}, @fwd={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000480)=""/4096, 0x63, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x9, 0xfffffffe, 0xc85, 0x340, r3, 0x40, '\x00', r4, r5, 0x0, 0x1, 0x4, 0x2}, 0x48) 05:45:23 executing program 2: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) r3 = gettid() ptrace$getenv(0x4201, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x3b, &(0x7f00000002c0)={0x38, 0x6d, 0x8}) 05:45:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB='@\x00', @ANYRES16=0x0, @ANYBLOB="000129"], 0x10c}}, 0x0) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r6, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r5, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r3, @ANYBLOB="000600"/16], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r6, 0xffffffffffffffff, r7, r8]}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000a40)={0x924, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x1, 0x8, 0x7f, 0xfffffff9}, {0x3ff, 0x7, 0x7f, 0x4}, {0x8, 0x7, 0x0, 0x4}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x884}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x3f, 0x81, 0x88}, {0x3, 0x0, 0x7, 0x1}, {0xd550, 0x9, 0x7, 0x4}, {0x6, 0x30, 0x7, 0x8001}, {0x401, 0x1f, 0xed, 0x7}, {0x4ba7, 0x11, 0x1f, 0x8001}, {0xff, 0x9, 0x76, 0x35}, {0x6, 0x9, 0x67, 0x3}]}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}]}, 0x924}}, 0x44085) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 3: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 2: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) r3 = gettid() ptrace$getenv(0x4201, r3, 0x0, 0x0) 05:45:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x48c4) 05:45:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r6, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r5, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r3, @ANYBLOB="000600"/16], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r6, 0xffffffffffffffff, r7, r8]}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000a40)={0x924, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x1, 0x8, 0x7f, 0xfffffff9}, {0x3ff, 0x7, 0x7f, 0x4}, {0x8, 0x7, 0x0, 0x4}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x884}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x3f, 0x81, 0x88}, {0x3, 0x0, 0x7, 0x1}, {0xd550, 0x9, 0x7, 0x4}, {0x6, 0x30, 0x7, 0x8001}, {0x401, 0x1f, 0xed, 0x7}, {0x4ba7, 0x11, 0x1f, 0x8001}, {0xff, 0x9, 0x76, 0x35}, {0x6, 0x9, 0x67, 0x3}]}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}]}, 0x924}}, 0x44085) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 3: socketpair(0x25, 0x0, 0x0, &(0x7f0000000180)) 05:45:23 executing program 2: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) gettid() 05:45:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x48c4) 05:45:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:23 executing program 3: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r6, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r5, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r3, @ANYBLOB="000600"/16], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r6, 0xffffffffffffffff, r7, r8]}, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000a40)={0x924, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x144, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x1, 0x8, 0x7f, 0xfffffff9}, {0x3ff, 0x7, 0x7f, 0x4}, {0x8, 0x7, 0x0, 0x4}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x884}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x3f, 0x81, 0x88}, {0x3, 0x0, 0x7, 0x1}, {0xd550, 0x9, 0x7, 0x4}, {0x6, 0x30, 0x7, 0x8001}, {0x401, 0x1f, 0xed, 0x7}, {0x4ba7, 0x11, 0x1f, 0x8001}, {0xff, 0x9, 0x76, 0x35}, {0x6, 0x9, 0x67, 0x3}]}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}]}, 0x924}}, 0x44085) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 2: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x12, 0x9, 0x5}) 05:45:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x48c4) 05:45:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:23 executing program 2: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r5, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r4, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r2, @ANYBLOB="000600"/16], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r3, 0x25, r4, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r5, 0xffffffffffffffff, r6, r7]}, 0x80) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 3: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) 05:45:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) 05:45:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:23 executing program 3: socketpair(0x25, 0x1, 0x0, 0x0) 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r3, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r2, &(0x7f0000000400)=""/26, 0x1a) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 05:45:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') 05:45:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r3, 0x5, 0x5, 0x5}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:23 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:23 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) 05:45:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:23 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) accept4$bt_l2cap(r2, &(0x7f0000000340), &(0x7f0000000380)=0xe, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') 05:45:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 05:45:24 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:24 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) syz_open_pts(r0, 0x109000) 05:45:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:24 executing program 5: syz_open_procfs(0x0, 0x0) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) ioctl$TCFLSH(r0, 0x540b, 0x1) 05:45:24 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) 05:45:24 executing program 5: syz_open_procfs(0x0, 0x0) 05:45:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:24 executing program 3: syz_open_procfs(0x0, 0x0) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 5: syz_open_procfs(0x0, 0x0) 05:45:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) 05:45:24 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r0, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r0, 0xffffffffffffffff, r1, r2]}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r6, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r5, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r3, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r6, 0xffffffffffffffff, r7, r8]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)={0x268, 0x0, 0x300, 0x70bd2a, 0x25dfdbff, {}, [{{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x7fff, 0x4b, 0x4, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x466}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r10}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x268}, 0x1, 0x0, 0x0, 0x8010}, 0x4010000) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:24 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}]}, 0x60}}, 0x8008) 05:45:24 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioprio_get$uid(0x3, 0xffffffffffffffff) 05:45:24 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:24 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}]}, 0x60}}, 0x8008) 05:45:24 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f0000000140)) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:24 executing program 2: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) ioprio_get$uid(0x3, 0xffffffffffffffff) 05:45:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:24 executing program 2: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:24 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:24 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xb4d}, 0x8) ioprio_get$uid(0x3, 0xffffffffffffffff) 05:45:25 executing program 2: ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}]}}]}, 0x60}}, 0x8008) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f0000000140)) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:25 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioprio_get$uid(0x3, 0xffffffffffffffff) 05:45:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 0: ioprio_get$uid(0x3, 0xffffffffffffffff) 05:45:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f0000000140)) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 0: ioprio_get$uid(0x0, 0xffffffffffffffff) 05:45:25 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 0: ioprio_get$uid(0x0, 0xffffffffffffffff) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:25 executing program 2: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 0: ioprio_get$uid(0x0, 0xffffffffffffffff) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:25 executing program 2: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:25 executing program 2: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:25 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:25 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:26 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x7, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, 0x0) 05:45:26 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, 0x0) 05:45:26 executing program 0: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000040)=0x7) 05:45:26 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, 0x0) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:26 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r5, 0x0) 05:45:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0xefc3, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) 05:45:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffa, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) 05:45:26 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r5, 0x0) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r5, 0x0) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) 05:45:26 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:26 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:26 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r3, 0x0) 05:45:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:26 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) 05:45:26 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r1, 0x4) r2 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r2, 0x0) 05:45:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0xfffffffffffffdd9, 0x82, 0x1}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, &(0x7f0000000340)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, &(0x7f0000000140)) ioctl$SOUND_PCM_READ_RATE(r0, 0x80045002, &(0x7f0000000300)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a490100000080000000800000005cdf0200000000000007000000000e0000000200000f0300000004000000ffffffffffffff7f01000000750000000500000091db390c0000000200000f020000000300000013080000ff0100000100000009005a0a0800000089a000006100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r1, 0x0) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffa, 0x0, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r1, 0x0) 05:45:27 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000580)={'gre0\x00', 0x0, 0x7f06, 0x700, 0xffffffe0, 0x7894, {{0x9, 0x4, 0x1, 0x37, 0x24, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @multicast1, {[@generic={0x44, 0xe, "9e27b731e268cca4fb7023ca"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r1, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:27 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x3, 0x1d, 0x7fff, 0x19a8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x3, 0x4, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x10}, @jmp={0x5, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0x10}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}]}, &(0x7f00000002c0)='GPL\x00', 0x1, 0x23, &(0x7f0000000300)=""/35, 0x40f00, 0x15, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000380)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x8000, 0xcacd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0x1, r2, 0xffffffffffffffff, r4]}, 0x80) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x7fffffff, 0x9, 0x8001, 0xfffffffffffffff9, 0x7, 0x400}) r5 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f0000000140)) ioctl$SNDCTL_DSP_POST(r5, 0x5008, 0x0) r6 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r6, 0x8010500c, &(0x7f0000000140)) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r6, 0x0) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 05:45:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:27 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:27 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_mount_image$minix(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x2, &(0x7f00000017c0)=[{0x0}, {0x0, 0x0, 0x7fff}], 0x0, &(0x7f0000001840)) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xec, r0, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x805) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000300), 0x2, 0x1a2442) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x34, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}, @ETHTOOL_A_LINKMODES_LANES={0x8}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x8049) 05:45:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:27 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:27 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:27 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) [ 1032.454261] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 05:45:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f020000000400000003000000080000000500000008000000ff0f000005000000030000000300000001000000ff0000003b913a4901000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:27 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:28 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:28 executing program 3: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9f"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) 05:45:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9f"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9f"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000000)) 05:45:28 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d0000000000000e02000000000000000c0000000500000f0200000004"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000500)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x0, {0xa, 0x4e24, 0x0, @mcast1, 0x100}}}, 0x38) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="73e761535571652acbf5860010000000dd00979b9cf98827f6e23488ed2cf0e32839ed00b89f5726a40d1a1c5eb6ac55c44221521ba5504938a8523062049fdef96665eca819091a1e9759f644c8de2bbae2a630347df242c61d08992b7d411209e493c65c12338053616f97c510b78027859bf1d89801e86ad4f8e8fcaabd14f549f8c2d9e45e83989531ed153915373fba2109c9a8044061c549dde66f7f99a3cd4158b10001c95f", @ANYRESOCT=r0, @ANYBLOB="00407851000000070000712e4e620038006700009f2f9078ac1414bb00000000070b18e0000001ac1414bb07072bac1414bb890b890a010100ffffffff8907760a010101"]}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/arp\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x0, 0x6, 0x800, 0x42, 0x1, 0x10000, '\x00', 0x0, r0, 0xffffffff, 0x0, 0x2, 0x2}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x14, 0x1f, 0x6, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, r0, 0x5, 0x1, 0x3}, 0x48) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0xbe}, @ldst={0x3, 0x3, 0x1, 0xb, 0x8, 0x10, 0x4}], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000280)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xf, 0x2, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, r5, 0xffffffffffffffff, 0x1, r6, r7, 0x1]}, 0x80) 05:45:28 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0xa0) 05:45:28 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:28 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400), 0x200402, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r7, 0x8004500b, &(0x7f0000000440)=0x101) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180024eb00000000001c000000ad000095f9ffffff000000e0932dd4344b875a900c20c763eaa97341224d26a555143b87071a31c231e9c569e7fe5e06ad7ff45f74817d42c8d31f48ff0600ed37ab18473a83"], &(0x7f0000000040)='GPL\x00', 0x4, 0x6, &(0x7f0000000080)=""/6, 0x41100, 0x3, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x6, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6]}, 0x80) 05:45:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x0, @dev}}}, 0xa0) 05:45:28 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, r0, 0x0) 05:45:28 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:28 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400), 0x200402, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r7, 0x8004500b, &(0x7f0000000440)=0x101) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180024eb00000000001c000000ad000095f9ffffff000000e0932dd4344b875a900c20c763eaa97341224d26a555143b87071a31c231e9c569e7fe5e06ad7ff45f74817d42c8d31f48ff0600ed37ab18473a83"], &(0x7f0000000040)='GPL\x00', 0x4, 0x6, &(0x7f0000000080)=""/6, 0x41100, 0x3, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x6, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6]}, 0x80) 05:45:29 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r0, 0x1000) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r0, 0x400) 05:45:29 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000040)={0x0, &(0x7f0000000180)=""/135, 0x49bdd61758df4dc4, 0xa1, 0x1}, 0xffffffffffffff59) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, 0xffffffffffffffff, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:29 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r0, 0x1000) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r0, 0x400) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400), 0x200402, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r7, 0x8004500b, &(0x7f0000000440)=0x101) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180024eb00000000001c000000ad000095f9ffffff000000e0932dd4344b875a900c20c763eaa97341224d26a555143b87071a31c231e9c569e7fe5e06ad7ff45f74817d42c8d31f48ff0600ed37ab18473a83"], &(0x7f0000000040)='GPL\x00', 0x4, 0x6, &(0x7f0000000080)=""/6, 0x41100, 0x3, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000001c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x6, 0x6, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r5, r6]}, 0x80) 05:45:29 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000000c0)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300b3000000030000000d000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r0, 0x1000) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, r0, 0x400) 05:45:29 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:29 executing program 1: ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x3, 0x101, 0x9, 0x8, 0xf, "daa9e6c429be810e"}) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400), 0x200402, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r5, 0x8004500b, &(0x7f0000000440)=0x101) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r0, 0x1000) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300), 0x802, 0x0) 05:45:29 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:29 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400), 0x200402, 0x0) 05:45:29 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') r0 = getgid() r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) fchownat(r1, &(0x7f0000000200)='./file0\x00', r2, r0, 0x1000) 05:45:29 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "49a192ca3cf182f4f5265eedb2f6fff2391b92"}) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x6, 0xf6, 0x200, 0xffffffffffffffff, 0x7, '\x00', 0x0, r1, 0x5, 0x3, 0x1, 0xff}, 0x48) 05:45:29 executing program 3: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getgid() syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) 05:45:29 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getgid() syz_open_dev$vcsa(&(0x7f0000000340), 0xffffffffffffffff, 0x204880) 05:45:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) r1 = bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x3, 0xfffffffc, 0x2, 0x30, 0x1, 0x1664, '\x00', 0x0, r1, 0x3, 0x2, 0x1}, 0x48) 05:45:29 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82, 0x8000}, 0x20) 05:45:29 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0xc, 0x11, r0, 0x0) 05:45:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:29 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getgid() 05:45:30 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, r0, 0x0) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82, 0x8000}, 0x20) 05:45:30 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8d5) 05:45:30 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3001300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82, 0x8000}, 0x20) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 4: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:30 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) socketpair(0x2a, 0x2, 0xffffdfec, &(0x7f0000000600)) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 4: renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 05:45:30 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x10, r0, 0x0) 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:30 executing program 4: renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:30 executing program 1: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 4: renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 1: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 4: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 05:45:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) write$dsp(0xffffffffffffffff, &(0x7f0000000480)="71f4e4b019503a08d12980d9de189ce3fc49f5ebfad19db97214ffc62bbe986649b25a5391d86caddd0d46e39fc65616e0f70d1825a9b471194045cae114a041e35508856a3d314f778137f3050ffb114eca5cedb12ce4cdcdba6cdcbb4ac4f14ca6b33d1fcf2651fb54fb95b54d39", 0x6f) 05:45:30 executing program 1: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$dsp(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 05:45:30 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:31 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3c) 05:45:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000380)='net/netlink\x00') r10 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xec, &(0x7f00000001c0)=""/236, 0x41000, 0x1c, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x101, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r7, 0xffffffffffffffff, r8, r9, r10]}, 0x80) 05:45:31 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 05:45:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 0: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000380)='net/netlink\x00') r10 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xec, &(0x7f00000001c0)=""/236, 0x41000, 0x1c, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x101, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r7, 0xffffffffffffffff, r8, r9, r10]}, 0x80) 05:45:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 0: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000380)='net/netlink\x00') r10 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xec, &(0x7f00000001c0)=""/236, 0x41000, 0x1c, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x101, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r7, 0xffffffffffffffff, r8, r9, r10]}, 0x80) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000040)) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') syz_open_procfs(0x0, &(0x7f0000000380)='net/netlink\x00') bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) 05:45:31 executing program 0: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000005c0), 0x4) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x24000, 0x0) 05:45:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') syz_open_procfs(0x0, &(0x7f0000000380)='net/netlink\x00') 05:45:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x24000, 0x0) 05:45:31 executing program 2: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) syz_open_procfs(0x0, &(0x7f0000000340)='net/mcfilter6\x00') 05:45:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:31 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x24000, 0x0) 05:45:32 executing program 2: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1d, 0x1, 0x6, 0xee, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 05:45:32 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x24000, 0x0) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 2: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r4, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r3, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r1, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r4, 0xffffffffffffffff, r5, r6]}, 0x80) 05:45:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r1, &(0x7f0000000400)=""/26, 0x1a) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r3) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x5}, 0x48) 05:45:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 05:45:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:32 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)={0xa, {0x9, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x0, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000000)) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x0, 0x0, 0x7}}, 0xa) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000000)) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) 05:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580), 0xa) 05:45:32 executing program 1: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:32 executing program 1: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:32 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000000)) 05:45:32 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) 05:45:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x0, 0xe6, 0x7}}, 0xa) 05:45:32 executing program 1: write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:32 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) 05:45:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:33 executing program 0: getgroups(0x1, &(0x7f0000001640)=[0xee00]) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) kexec_load(0x7, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, {0x0, 0x0, 0x7}}, 0xa) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, r0, 0x2, 0x805, 0x81, 0x3}, 0x48) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) 05:45:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580), 0xa) 05:45:33 executing program 0: getgroups(0x1, &(0x7f0000001640)=[0xee00]) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) kexec_load(0x7, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b300"], &(0x7f0000000000)=""/177, 0xcf, 0xb1, 0x1}, 0x20) 05:45:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/101, 0x1a, 0x81, 0x4}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 05:45:33 executing program 0: getgroups(0x1, &(0x7f0000001640)=[0xee00]) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) kexec_load(0x7, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="bd0f10a975e59cc1f17012427b500e5091db74aa6d3c6054a0f709f6f64f9a4593926c257ad4ff7dabf0d897f295197755089b7d32e1ee065158e8559321be932a7b0398ec4e26113dbbb6aa76559c09412ef095f48799ba8aa5f557f19e6f57c60395ce1335dae21e2512620f3872f682237e87a3813d5e850358842dfe0d7b454232051b7aff91d7ee60030f14fa531d64c567a64835fa72c2b314ffe2d8a10072c85e48ca0299dc20ca9e11d83d894cfb901ce639b2b6037d2ee7c9eede400e26bd86982a1c943baec1e01916c1891403b34865579a6649e3e806e31f90186bc00af073d542626bbc8ef144fd770c7e338b0f6390febd882999d780d8f443c5e08e9496ab812cbb7713ce132be9490ccb6af4ecf0c1e2994fc4ed34b8d84f255b63564bc1339891b3f1a824ccbe6fa804ab69877ba0ced6572bacc29738f3b9bb6dc566a226ab3d1c9f19f7f762c6f5b84a5c1dcb3f22047df4a4d6d013b4bd8a3640129618ea074895c009927f273552399fa9f13f04a7cdea044afc30c1ed07c50e42545d2bdc58ecabb1a1eb66bdfbd7ea81f5209a516f396fa210353d065245edaca3f7dac9a3d0b03d73fe0abfb5b4d230a3aa4235a712b9d8aafb202dba35194aa4426b5eccfe0142be2a1539a315d7122517fbd989a1070f6228d1f4c33cd54e55a4d9148315e5aa855254b56463c1a9819dca4b422b2dc384eb19c6696a7fa130545b61823158b1b064d5bb2ca6527f6f07423a7007694a09229808554f676f63f527d3702a468258304e749b4256f6f253d2bd0c240fe6513a2d902d34c053b83328d08ba685b3c0bba7716076f24898890d364b732c5e79991fd60562bf42ba8c309216c06ff4e421a5903134a37d72eab9e2103f8c10a4d812baa178b474a86feaf58064dc99637385ca8885f8f0315aaf83c4ad7fcd703416e2c194c439a8065d560819b0c43f19766bf6e83975455e8280bffac14eaccac40d5583c7070a85c967470a22f14aa17e43ab41d89b8702c76fb6512c004f3a70576ba9305111b7efe9398db01c09b54636ba2be31d844f169bc89814c8832752c67dc3ac8cac1b7aeb16e03c06010e3814578650b953e757d8906afa4790f072fc78b33e7c9c0343f1fb50207f0b92369bbb9db4bf09c93f0bbb760d6512719b0e7f8cb52c3854be8f4bfe680d5d5db8611b3d97515176bb526a63275ea8048088fff40c9ecac444854919865848c2a5eb40fa4eaf039d25805704f527cd334600f4878065b10a7b6cd3b86459cf148117650a003014764542212d2773d2572d41384eeb9a16dd98cc22dea5772f372acf2c1db18f79cb0bdb4aacef80d7f4d601a237facf8e3065ca15800453ced4001747f52cb8470f2d96524c551e210c8e8609b9842df8b2df205c6203ceecb5f76b2f562b2571ab085e23a82fc05247bc997ba7d787155e19b96b79d687c68de7087a50f35037ee5022fecfb9e702213bf24970d0f4fbbf4524d791acb872a52a151150c5649397ddcd92036083a8dd87fad890ec0963e3dec320a02192b76726ff71413537ca03a000ba79c1edf8772422cb9bdec8a6acd73e83c214d7c27dc0ac2e52747ba60dffb58cb264907be0cbfb3aa86ab2a52b7096aa9d864e571ba8e2424a7e72b883c88790e39fb593fca4af4b265db9633d47d1e9a7e1e82f7ac88db72a9683232413e33f4f3c1e104e0d3031eb606c1ba95e219bb9a1d3a27d84073645b56cb94712760aa291a82ce08fa190fb69d5283105adfb2fe6b992a7d7170b01aab587a836a4cedc3073020298b9fff490d42cce011077d36d6ed9c9b3b381b51d1de598ded9b32dc883528b9b3c8b4158fed50056982c20c104888065e733220b58f7c32efc760492fbf3e2fd95bf41a1d61b8280175a421f6a38ef134126bbae7159797fa75c3469a4ba0a2da4c21ecde15245efb6e1f77fc3fb308b7ba81b5532affe8567a87d09a4c73479395f6dce107fe9fefa05ac327022b27b8799ef67737ce5362b0cb70299bff329286ef877b7c676131486f9f0fc134c5ec0ece377ae2f1f8fb134100589edaf02c882c3c8614868a95dfdc6a884e1b6394e2b7f9b6309412ab52590e16f07e87d788fb6aa667734b3e62f6efb60bcadf7f5ab912b7d4b6e7426db22a2b810bfe80f65f69cc0931f74598273535fab2dd1c4d7b184099f37aa4cbd67544562afca55eb7b84ab4d4b63f459b781965852a3e231b8fa9f0e0396a8e5823fe21016066ea1b84f040ad6e38a5f79d27eb1eb4d2cecea67138224e0a4c08a0371b1f5898fe9fe42c4d07232ea2033bc2f31a112a7f4b66e04d0a367ed859adf81e43722d5ec791050f1f5225cf954367b4af24a8b8925d161a85db790fd662fdb4da9ac531886f8ca565ba956cc2e4aba00e5f39b69a33041ba6777ce8e48e6e874376f295ccbab1d5b065d127348e7c807ad5c311af63f6e6e471d351061562364adb274f79532408f79d8d552acdf398ab0cbc0c30d2863ea40bc44c9ce238f5d615c431b084a8fbb923f5dcdbc0bd233d94da03afb7ac0e5a603b3a9be9264aeb85e03b0371da0b3fd5945065f3af6c2e7b7009ba0e83df360c16d97ea60ad76e7f333dd9a8d22d113b192d7cb3bd189e72e11704b6ed7ac417ab2668fecd58149a44d217cbe94e2843558772df9dc3a64a80a44061b285dae4ce618e8b60ebbccde9ee84cb54404263c940d479e67024a1f56f8f7d1071420f298608b4f295d47870acd2bfbede4297412d31cd068cb61ead30fc7f75244d602058a36d205c42d8ab6b936858386aa1d59c60e0be219ffb31745b1fd5b1be16e05907dedaffc81e6bb9ee907bf586c4223e243d178d5e0344b635e08ae25c5a5e58d55469e2cb4d839b83ac4efdafd54433eb9cb36dcbb21482693b77aaf4a43736ed345f88135a2cf64035dc3288e04017a5143741ae80789824b9b27e2ddb37ed6e7ce42df3f5f46b646066072a746f0db934a1d5a6edd9fc40918d990453a8cb57a834c9172f793080d0c01f7209bfc25baef9802530e7bffa5865ecc8cd0f3bfcb735c8c04ba9486c9b26973c0a3a59e997e0e615eaf0f57e2ebc4479bcf21164d29af7e08b8c00e48fcdcddf8ab5212330a0114ab7474f4353e7e11c5cd349cd68e815e54f1d3d1528cc7c576c12238466504a7d7d57e6c273b5626ee97a3f4a590f01a3cd59f905601ee513e3d675ac7f937a1470c6fe1704baf1c10fd3f89121e1f2282344dd15c295f09ce1b7113d81046841f4f41dde87c7f5651cce38b24a23f6e4be47d13d2b113800c5db7bc559b4ca5dd67bdc5a372cb0b46c31463d074a821cc5cfe1eb58b2aa0bab3062bb52159f2aaff2354dfa9f0a02fec10beff22a77fb7b2f8a80f99d36ccfa20849c04cb726de12318e83cdf1a8fbd444bbb71e9d506156beb21d45395b25d2d752fac13543440555346f07a6ca342d3b90fe47f5f655928daae505bcd8f92ea7ed521eb397ac1a290c7c1fa81d58aa12e2ff088b4ab9f995f1b3c92102471d446295b3c9e6065f35daed7ae976115dd90bef5521d18575bdcb226b407d6382a5ea930c923a3992cd97615d160f43d79ef2aaf1577f2951d99adc5d2fd99122d15c5a7be9810c554414c9ae6d360bd4a6a7e5ddd4740ed50878636b032a74ab92f19707bc3f21632a2f112ecdf4ef12ee35aa0598cd8c9905a6cd63ca384d6aa65734494a895618bf5d2763b1ef459f405c71544d0dcbe3b85e19ce83eef5722aca8a36ff63a000d98c5f89481eb04310db8eb9ceecc8ad7634ec46f67facfc4e95fe2c398658ead90a4e4427160fa4a9bf213da175a38abc9c3bcf794d112508cedb1ca264d3f45796c2be95021286e321709eaf268e3f2236187e17c9b854d0ccd1970bdf5834f93a771295aed33add10d5f240cea19be6ff8d57eda91ab7fb738afdb67f8095cca0b6e7b3dc4c8599f214428b9af2faa115933e3b0eba96e9d2fdab0603f39e460ed95b6ef4a6c6bea8ebdcd93e72e02796a09073e4f72e0dec0dea85ab498d4230b3b992f1c1179f37818721f814c1f38030007f0b32566db62fe1a7dfdafb7a76f17d80db358df3b876546bccbda4ea1c87876d800bb7b2186cb8d96d5d0cc0a1da9925d5bad8fe4f6dc9a44a471e14ab3d730a557c68006676db5fab5485731aa6b7523c43c15f1f0aa64d06e256098e9578e5e1ca15cf5fe07a2f4b75c6df9c452b70a93921e307f1839b5916cb9c662f962b65a41acfa46e27c58d38c0cea6040a26139efd0f88eb6fe76c3517e7167fb06dba80aa8dd8d20a3584d3f6cf5506332122d65547faba7ff30b110d3fb1a573bfac0af372ec11c8da38b51c061d353c5b94b9cc78e8da88f5c0fd8890fad8fa5db612eb28545cb4c3df9da8bb151089078441d039fc422ebb0b210758659bf336f6746702324413c15b8be25855de470fc3e3d14917a88760d131b39657d3215611fd06e94e3360d5782201b8b3caf5bd7854b15f98f6412de7426684240ddec39a804cc995562908c6ad724d25da0b67f9686b9eaa6c0fa8eb455a2c407e71ef9fa6ea199468542fa41ea2b431f147682b800a7140b42d88fb2f2d25f86bc819661b63eb6e3ef0e63c59ef58fcf078b5dba8b5f65e5e3c148d3aaff5baecfa8ad30fec920eb424f540570e21355ba7c77d5e2a69ae157380d90f90920a257f803247df2423165ce3c60069a402703b75d133ee15e38bc0ee6977d7531f9c4d0614e889994980e5674ef4f6c3070c6da831f0f0fcfd469c82647b83a7486cfd33213c3d44c3faf9ae3ba0eea80f4c4fcf837b0e5a1775cfaeb4552cf7eb931a56c959cda346c2af8b547077c26fb24216fdd7bcafd52a0c9e4859499859433edab5a7629e6d827cec7774859638dda0cf84b21f844b1c78211d87a1f27e255a169950d521cd8b14ef83e6bfd01ebdfe4c252c9aa38fe9d420ed4808be3bb95fc773e33323ddf88d9be507f0cf0091909ed43e19b35837e23a2e5b6e9b956ffbcd3144a81c6d39bde86813adca9c723f37ce946f0c9db5022ad896609db7ae408891922e89492945bff5a0ee2cd8369528ba542be715a7b2b6fa929ccfd4989ba01aec0293830b504e2729467d572ac260a411f81184b968529d65dc0d43b87a2829db7dc9ce087c20555b4ad9ad7b8e1f09778437fe43ed04c049df9f4e820bfcd977eefa6bdf4f0763d05c4a2d28efae0f96d2b67dcfb86f88dd00729a6a10f829e900100b89edec3bf1145fa8e34bc31b85e05ee09c3d870e7eccea322b149644ecb452c85eddd3acffe0f7d1c6351dfa6b99edc955ece620367d16a33f13104a2c16e9d6efbf4d42ef01bb893077d71c2442cc191e2574de4b8c14dcde542a1e2108ae098140a9e8a0a99375a0d6f4359ce252897ce2a82dc33fee480e62dedeb8ad0374f1e5a6487b4a928ffe166c099c046e3d77b140ef23c5e697a150fc441d3f9925058dee10e9ea98c04c4d7749d0e260f1c020dd89d71f016a51b4957091a407c5a8afa8a9ab871168ea80f78753452cde42895530e6ee55fe2dfbc167e89ba74d5b27b40529ede11089f8dd2fc88cd1852bcdb87f3b237ce67a2e0497982f1c36633706637fa0077e081341e919e5fe57a70b5168bf985ccca6166cff59caa459d94b7927fc27db3781fa98125346cbc7980c9229d9f7cb8beb1cfe77c70edfaf78e0415698f9ecc9e55611e806dbeb13e38e07a78c875bffc70a2c7e7fc2b04e960b9ce963e2c4f27caed9dc3ea553cb82a35d318993", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000440)) 05:45:33 executing program 0: getgroups(0x1, &(0x7f0000001640)=[0xee00]) kexec_load(0x7, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="bd0f10a975e59cc1f17012427b500e5091db74aa6d3c6054a0f709f6f64f9a4593926c257ad4ff7dabf0d897f295197755089b7d32e1ee065158e8559321be932a7b0398ec4e26113dbbb6aa76559c09412ef095f48799ba8aa5f557f19e6f57c60395ce1335dae21e2512620f3872f682237e87a3813d5e850358842dfe0d7b454232051b7aff91d7ee60030f14fa531d64c567a64835fa72c2b314ffe2d8a10072c85e48ca0299dc20ca9e11d83d894cfb901ce639b2b6037d2ee7c9eede400e26bd86982a1c943baec1e01916c1891403b34865579a6649e3e806e31f90186bc00af073d542626bbc8ef144fd770c7e338b0f6390febd882999d780d8f443c5e08e9496ab812cbb7713ce132be9490ccb6af4ecf0c1e2994fc4ed34b8d84f255b63564bc1339891b3f1a824ccbe6fa804ab69877ba0ced6572bacc29738f3b9bb6dc566a226ab3d1c9f19f7f762c6f5b84a5c1dcb3f22047df4a4d6d013b4bd8a3640129618ea074895c009927f273552399fa9f13f04a7cdea044afc30c1ed07c50e42545d2bdc58ecabb1a1eb66bdfbd7ea81f5209a516f396fa210353d065245edaca3f7dac9a3d0b03d73fe0abfb5b4d230a3aa4235a712b9d8aafb202dba35194aa4426b5eccfe0142be2a1539a315d7122517fbd989a1070f6228d1f4c33cd54e55a4d9148315e5aa855254b56463c1a9819dca4b422b2dc384eb19c6696a7fa130545b61823158b1b064d5bb2ca6527f6f07423a7007694a09229808554f676f63f527d3702a468258304e749b4256f6f253d2bd0c240fe6513a2d902d34c053b83328d08ba685b3c0bba7716076f24898890d364b732c5e79991fd60562bf42ba8c309216c06ff4e421a5903134a37d72eab9e2103f8c10a4d812baa178b474a86feaf58064dc99637385ca8885f8f0315aaf83c4ad7fcd703416e2c194c439a8065d560819b0c43f19766bf6e83975455e8280bffac14eaccac40d5583c7070a85c967470a22f14aa17e43ab41d89b8702c76fb6512c004f3a70576ba9305111b7efe9398db01c09b54636ba2be31d844f169bc89814c8832752c67dc3ac8cac1b7aeb16e03c06010e3814578650b953e757d8906afa4790f072fc78b33e7c9c0343f1fb50207f0b92369bbb9db4bf09c93f0bbb760d6512719b0e7f8cb52c3854be8f4bfe680d5d5db8611b3d97515176bb526a63275ea8048088fff40c9ecac444854919865848c2a5eb40fa4eaf039d25805704f527cd334600f4878065b10a7b6cd3b86459cf148117650a003014764542212d2773d2572d41384eeb9a16dd98cc22dea5772f372acf2c1db18f79cb0bdb4aacef80d7f4d601a237facf8e3065ca15800453ced4001747f52cb8470f2d96524c551e210c8e8609b9842df8b2df205c6203ceecb5f76b2f562b2571ab085e23a82fc05247bc997ba7d787155e19b96b79d687c68de7087a50f35037ee5022fecfb9e702213bf24970d0f4fbbf4524d791acb872a52a151150c5649397ddcd92036083a8dd87fad890ec0963e3dec320a02192b76726ff71413537ca03a000ba79c1edf8772422cb9bdec8a6acd73e83c214d7c27dc0ac2e52747ba60dffb58cb264907be0cbfb3aa86ab2a52b7096aa9d864e571ba8e2424a7e72b883c88790e39fb593fca4af4b265db9633d47d1e9a7e1e82f7ac88db72a9683232413e33f4f3c1e104e0d3031eb606c1ba95e219bb9a1d3a27d84073645b56cb94712760aa291a82ce08fa190fb69d5283105adfb2fe6b992a7d7170b01aab587a836a4cedc3073020298b9fff490d42cce011077d36d6ed9c9b3b381b51d1de598ded9b32dc883528b9b3c8b4158fed50056982c20c104888065e733220b58f7c32efc760492fbf3e2fd95bf41a1d61b8280175a421f6a38ef134126bbae7159797fa75c3469a4ba0a2da4c21ecde15245efb6e1f77fc3fb308b7ba81b5532affe8567a87d09a4c73479395f6dce107fe9fefa05ac327022b27b8799ef67737ce5362b0cb70299bff329286ef877b7c676131486f9f0fc134c5ec0ece377ae2f1f8fb134100589edaf02c882c3c8614868a95dfdc6a884e1b6394e2b7f9b6309412ab52590e16f07e87d788fb6aa667734b3e62f6efb60bcadf7f5ab912b7d4b6e7426db22a2b810bfe80f65f69cc0931f74598273535fab2dd1c4d7b184099f37aa4cbd67544562afca55eb7b84ab4d4b63f459b781965852a3e231b8fa9f0e0396a8e5823fe21016066ea1b84f040ad6e38a5f79d27eb1eb4d2cecea67138224e0a4c08a0371b1f5898fe9fe42c4d07232ea2033bc2f31a112a7f4b66e04d0a367ed859adf81e43722d5ec791050f1f5225cf954367b4af24a8b8925d161a85db790fd662fdb4da9ac531886f8ca565ba956cc2e4aba00e5f39b69a33041ba6777ce8e48e6e874376f295ccbab1d5b065d127348e7c807ad5c311af63f6e6e471d351061562364adb274f79532408f79d8d552acdf398ab0cbc0c30d2863ea40bc44c9ce238f5d615c431b084a8fbb923f5dcdbc0bd233d94da03afb7ac0e5a603b3a9be9264aeb85e03b0371da0b3fd5945065f3af6c2e7b7009ba0e83df360c16d97ea60ad76e7f333dd9a8d22d113b192d7cb3bd189e72e11704b6ed7ac417ab2668fecd58149a44d217cbe94e2843558772df9dc3a64a80a44061b285dae4ce618e8b60ebbccde9ee84cb54404263c940d479e67024a1f56f8f7d1071420f298608b4f295d47870acd2bfbede4297412d31cd068cb61ead30fc7f75244d602058a36d205c42d8ab6b936858386aa1d59c60e0be219ffb31745b1fd5b1be16e05907dedaffc81e6bb9ee907bf586c4223e243d178d5e0344b635e08ae25c5a5e58d55469e2cb4d839b83ac4efdafd54433eb9cb36dcbb21482693b77aaf4a43736ed345f88135a2cf64035dc3288e04017a5143741ae80789824b9b27e2ddb37ed6e7ce42df3f5f46b646066072a746f0db934a1d5a6edd9fc40918d990453a8cb57a834c9172f793080d0c01f7209bfc25baef9802530e7bffa5865ecc8cd0f3bfcb735c8c04ba9486c9b26973c0a3a59e997e0e615eaf0f57e2ebc4479bcf21164d29af7e08b8c00e48fcdcddf8ab5212330a0114ab7474f4353e7e11c5cd349cd68e815e54f1d3d1528cc7c576c12238466504a7d7d57e6c273b5626ee97a3f4a590f01a3cd59f905601ee513e3d675ac7f937a1470c6fe1704baf1c10fd3f89121e1f2282344dd15c295f09ce1b7113d81046841f4f41dde87c7f5651cce38b24a23f6e4be47d13d2b113800c5db7bc559b4ca5dd67bdc5a372cb0b46c31463d074a821cc5cfe1eb58b2aa0bab3062bb52159f2aaff2354dfa9f0a02fec10beff22a77fb7b2f8a80f99d36ccfa20849c04cb726de12318e83cdf1a8fbd444bbb71e9d506156beb21d45395b25d2d752fac13543440555346f07a6ca342d3b90fe47f5f655928daae505bcd8f92ea7ed521eb397ac1a290c7c1fa81d58aa12e2ff088b4ab9f995f1b3c92102471d446295b3c9e6065f35daed7ae976115dd90bef5521d18575bdcb226b407d6382a5ea930c923a3992cd97615d160f43d79ef2aaf1577f2951d99adc5d2fd99122d15c5a7be9810c554414c9ae6d360bd4a6a7e5ddd4740ed50878636b032a74ab92f19707bc3f21632a2f112ecdf4ef12ee35aa0598cd8c9905a6cd63ca384d6aa65734494a895618bf5d2763b1ef459f405c71544d0dcbe3b85e19ce83eef5722aca8a36ff63a000d98c5f89481eb04310db8eb9ceecc8ad7634ec46f67facfc4e95fe2c398658ead90a4e4427160fa4a9bf213da175a38abc9c3bcf794d112508cedb1ca264d3f45796c2be95021286e321709eaf268e3f2236187e17c9b854d0ccd1970bdf5834f93a771295aed33add10d5f240cea19be6ff8d57eda91ab7fb738afdb67f8095cca0b6e7b3dc4c8599f214428b9af2faa115933e3b0eba96e9d2fdab0603f39e460ed95b6ef4a6c6bea8ebdcd93e72e02796a09073e4f72e0dec0dea85ab498d4230b3b992f1c1179f37818721f814c1f38030007f0b32566db62fe1a7dfdafb7a76f17d80db358df3b876546bccbda4ea1c87876d800bb7b2186cb8d96d5d0cc0a1da9925d5bad8fe4f6dc9a44a471e14ab3d730a557c68006676db5fab5485731aa6b7523c43c15f1f0aa64d06e256098e9578e5e1ca15cf5fe07a2f4b75c6df9c452b70a93921e307f1839b5916cb9c662f962b65a41acfa46e27c58d38c0cea6040a26139efd0f88eb6fe76c3517e7167fb06dba80aa8dd8d20a3584d3f6cf5506332122d65547faba7ff30b110d3fb1a573bfac0af372ec11c8da38b51c061d353c5b94b9cc78e8da88f5c0fd8890fad8fa5db612eb28545cb4c3df9da8bb151089078441d039fc422ebb0b210758659bf336f6746702324413c15b8be25855de470fc3e3d14917a88760d131b39657d3215611fd06e94e3360d5782201b8b3caf5bd7854b15f98f6412de7426684240ddec39a804cc995562908c6ad724d25da0b67f9686b9eaa6c0fa8eb455a2c407e71ef9fa6ea199468542fa41ea2b431f147682b800a7140b42d88fb2f2d25f86bc819661b63eb6e3ef0e63c59ef58fcf078b5dba8b5f65e5e3c148d3aaff5baecfa8ad30fec920eb424f540570e21355ba7c77d5e2a69ae157380d90f90920a257f803247df2423165ce3c60069a402703b75d133ee15e38bc0ee6977d7531f9c4d0614e889994980e5674ef4f6c3070c6da831f0f0fcfd469c82647b83a7486cfd33213c3d44c3faf9ae3ba0eea80f4c4fcf837b0e5a1775cfaeb4552cf7eb931a56c959cda346c2af8b547077c26fb24216fdd7bcafd52a0c9e4859499859433edab5a7629e6d827cec7774859638dda0cf84b21f844b1c78211d87a1f27e255a169950d521cd8b14ef83e6bfd01ebdfe4c252c9aa38fe9d420ed4808be3bb95fc773e33323ddf88d9be507f0cf0091909ed43e19b35837e23a2e5b6e9b956ffbcd3144a81c6d39bde86813adca9c723f37ce946f0c9db5022ad896609db7ae408891922e89492945bff5a0ee2cd8369528ba542be715a7b2b6fa929ccfd4989ba01aec0293830b504e2729467d572ac260a411f81184b968529d65dc0d43b87a2829db7dc9ce087c20555b4ad9ad7b8e1f09778437fe43ed04c049df9f4e820bfcd977eefa6bdf4f0763d05c4a2d28efae0f96d2b67dcfb86f88dd00729a6a10f829e900100b89edec3bf1145fa8e34bc31b85e05ee09c3d870e7eccea322b149644ecb452c85eddd3acffe0f7d1c6351dfa6b99edc955ece620367d16a33f13104a2c16e9d6efbf4d42ef01bb893077d71c2442cc191e2574de4b8c14dcde542a1e2108ae098140a9e8a0a99375a0d6f4359ce252897ce2a82dc33fee480e62dedeb8ad0374f1e5a6487b4a928ffe166c099c046e3d77b140ef23c5e697a150fc441d3f9925058dee10e9ea98c04c4d7749d0e260f1c020dd89d71f016a51b4957091a407c5a8afa8a9ab871168ea80f78753452cde42895530e6ee55fe2dfbc167e89ba74d5b27b40529ede11089f8dd2fc88cd1852bcdb87f3b237ce67a2e0497982f1c36633706637fa0077e081341e919e5fe57a70b5168bf985ccca6166cff59caa459d94b7927fc27db3781fa98125346cbc7980c9229d9f7cb8beb1cfe77c70edfaf78e0415698f9ecc9e55611e806dbeb13e38e07a78c875bffc70a2c7e7fc2b04e960b9ce963e2c4f27caed9dc3ea553cb82a35d318993", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:33 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], 0x0, 0xcf, 0x0, 0x1}, 0x20) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xff52, 0x0, {"0b5eabc095b58a2902448236c05dd303"}, 0x6, 0x7, 0x5}}}, 0xa0) 05:45:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) 05:45:33 executing program 0: kexec_load(0x7, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="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", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:33 executing program 0: kexec_load(0x0, 0x4, &(0x7f0000001300)=[{&(0x7f00000001c0)="bd0f10a975e59cc1f17012427b500e5091db74aa6d3c6054a0f709f6f64f9a4593926c257ad4ff7dabf0d897f295197755089b7d32e1ee065158e8559321be932a7b0398ec4e26113dbbb6aa76559c09412ef095f48799ba8aa5f557f19e6f57c60395ce1335dae21e2512620f3872f682237e87a3813d5e850358842dfe0d7b454232051b7aff91d7ee60030f14fa531d64c567a64835fa72c2b314ffe2d8a10072c85e48ca0299dc20ca9e11d83d894cfb901ce639b2b6037d2ee7c9eede400e26bd86982a1c943baec1e01916c1891403b34865579a6649e3e806e31f90186bc00af073d542626bbc8ef144fd770c7e338b0f6390febd882999d780d8f443c5e08e9496ab812cbb7713ce132be9490ccb6af4ecf0c1e2994fc4ed34b8d84f255b63564bc1339891b3f1a824ccbe6fa804ab69877ba0ced6572bacc29738f3b9bb6dc566a226ab3d1c9f19f7f762c6f5b84a5c1dcb3f22047df4a4d6d013b4bd8a3640129618ea074895c009927f273552399fa9f13f04a7cdea044afc30c1ed07c50e42545d2bdc58ecabb1a1eb66bdfbd7ea81f5209a516f396fa210353d065245edaca3f7dac9a3d0b03d73fe0abfb5b4d230a3aa4235a712b9d8aafb202dba35194aa4426b5eccfe0142be2a1539a315d7122517fbd989a1070f6228d1f4c33cd54e55a4d9148315e5aa855254b56463c1a9819dca4b422b2dc384eb19c6696a7fa130545b61823158b1b064d5bb2ca6527f6f07423a7007694a09229808554f676f63f527d3702a468258304e749b4256f6f253d2bd0c240fe6513a2d902d34c053b83328d08ba685b3c0bba7716076f24898890d364b732c5e79991fd60562bf42ba8c309216c06ff4e421a5903134a37d72eab9e2103f8c10a4d812baa178b474a86feaf58064dc99637385ca8885f8f0315aaf83c4ad7fcd703416e2c194c439a8065d560819b0c43f19766bf6e83975455e8280bffac14eaccac40d5583c7070a85c967470a22f14aa17e43ab41d89b8702c76fb6512c004f3a70576ba9305111b7efe9398db01c09b54636ba2be31d844f169bc89814c8832752c67dc3ac8cac1b7aeb16e03c06010e3814578650b953e757d8906afa4790f072fc78b33e7c9c0343f1fb50207f0b92369bbb9db4bf09c93f0bbb760d6512719b0e7f8cb52c3854be8f4bfe680d5d5db8611b3d97515176bb526a63275ea8048088fff40c9ecac444854919865848c2a5eb40fa4eaf039d25805704f527cd334600f4878065b10a7b6cd3b86459cf148117650a003014764542212d2773d2572d41384eeb9a16dd98cc22dea5772f372acf2c1db18f79cb0bdb4aacef80d7f4d601a237facf8e3065ca15800453ced4001747f52cb8470f2d96524c551e210c8e8609b9842df8b2df205c6203ceecb5f76b2f562b2571ab085e23a82fc05247bc997ba7d787155e19b96b79d687c68de7087a50f35037ee5022fecfb9e702213bf24970d0f4fbbf4524d791acb872a52a151150c5649397ddcd92036083a8dd87fad890ec0963e3dec320a02192b76726ff71413537ca03a000ba79c1edf8772422cb9bdec8a6acd73e83c214d7c27dc0ac2e52747ba60dffb58cb264907be0cbfb3aa86ab2a52b7096aa9d864e571ba8e2424a7e72b883c88790e39fb593fca4af4b265db9633d47d1e9a7e1e82f7ac88db72a9683232413e33f4f3c1e104e0d3031eb606c1ba95e219bb9a1d3a27d84073645b56cb94712760aa291a82ce08fa190fb69d5283105adfb2fe6b992a7d7170b01aab587a836a4cedc3073020298b9fff490d42cce011077d36d6ed9c9b3b381b51d1de598ded9b32dc883528b9b3c8b4158fed50056982c20c104888065e733220b58f7c32efc760492fbf3e2fd95bf41a1d61b8280175a421f6a38ef134126bbae7159797fa75c3469a4ba0a2da4c21ecde15245efb6e1f77fc3fb308b7ba81b5532affe8567a87d09a4c73479395f6dce107fe9fefa05ac327022b27b8799ef67737ce5362b0cb70299bff329286ef877b7c676131486f9f0fc134c5ec0ece377ae2f1f8fb134100589edaf02c882c3c8614868a95dfdc6a884e1b6394e2b7f9b6309412ab52590e16f07e87d788fb6aa667734b3e62f6efb60bcadf7f5ab912b7d4b6e7426db22a2b810bfe80f65f69cc0931f74598273535fab2dd1c4d7b184099f37aa4cbd67544562afca55eb7b84ab4d4b63f459b781965852a3e231b8fa9f0e0396a8e5823fe21016066ea1b84f040ad6e38a5f79d27eb1eb4d2cecea67138224e0a4c08a0371b1f5898fe9fe42c4d07232ea2033bc2f31a112a7f4b66e04d0a367ed859adf81e43722d5ec791050f1f5225cf954367b4af24a8b8925d161a85db790fd662fdb4da9ac531886f8ca565ba956cc2e4aba00e5f39b69a33041ba6777ce8e48e6e874376f295ccbab1d5b065d127348e7c807ad5c311af63f6e6e471d351061562364adb274f79532408f79d8d552acdf398ab0cbc0c30d2863ea40bc44c9ce238f5d615c431b084a8fbb923f5dcdbc0bd233d94da03afb7ac0e5a603b3a9be9264aeb85e03b0371da0b3fd5945065f3af6c2e7b7009ba0e83df360c16d97ea60ad76e7f333dd9a8d22d113b192d7cb3bd189e72e11704b6ed7ac417ab2668fecd58149a44d217cbe94e2843558772df9dc3a64a80a44061b285dae4ce618e8b60ebbccde9ee84cb54404263c940d479e67024a1f56f8f7d1071420f298608b4f295d47870acd2bfbede4297412d31cd068cb61ead30fc7f75244d602058a36d205c42d8ab6b936858386aa1d59c60e0be219ffb31745b1fd5b1be16e05907dedaffc81e6bb9ee907bf586c4223e243d178d5e0344b635e08ae25c5a5e58d55469e2cb4d839b83ac4efdafd54433eb9cb36dcbb21482693b77aaf4a43736ed345f88135a2cf64035dc3288e04017a5143741ae80789824b9b27e2ddb37ed6e7ce42df3f5f46b646066072a746f0db934a1d5a6edd9fc40918d990453a8cb57a834c9172f793080d0c01f7209bfc25baef9802530e7bffa5865ecc8cd0f3bfcb735c8c04ba9486c9b26973c0a3a59e997e0e615eaf0f57e2ebc4479bcf21164d29af7e08b8c00e48fcdcddf8ab5212330a0114ab7474f4353e7e11c5cd349cd68e815e54f1d3d1528cc7c576c12238466504a7d7d57e6c273b5626ee97a3f4a590f01a3cd59f905601ee513e3d675ac7f937a1470c6fe1704baf1c10fd3f89121e1f2282344dd15c295f09ce1b7113d81046841f4f41dde87c7f5651cce38b24a23f6e4be47d13d2b113800c5db7bc559b4ca5dd67bdc5a372cb0b46c31463d074a821cc5cfe1eb58b2aa0bab3062bb52159f2aaff2354dfa9f0a02fec10beff22a77fb7b2f8a80f99d36ccfa20849c04cb726de12318e83cdf1a8fbd444bbb71e9d506156beb21d45395b25d2d752fac13543440555346f07a6ca342d3b90fe47f5f655928daae505bcd8f92ea7ed521eb397ac1a290c7c1fa81d58aa12e2ff088b4ab9f995f1b3c92102471d446295b3c9e6065f35daed7ae976115dd90bef5521d18575bdcb226b407d6382a5ea930c923a3992cd97615d160f43d79ef2aaf1577f2951d99adc5d2fd99122d15c5a7be9810c554414c9ae6d360bd4a6a7e5ddd4740ed50878636b032a74ab92f19707bc3f21632a2f112ecdf4ef12ee35aa0598cd8c9905a6cd63ca384d6aa65734494a895618bf5d2763b1ef459f405c71544d0dcbe3b85e19ce83eef5722aca8a36ff63a000d98c5f89481eb04310db8eb9ceecc8ad7634ec46f67facfc4e95fe2c398658ead90a4e4427160fa4a9bf213da175a38abc9c3bcf794d112508cedb1ca264d3f45796c2be95021286e321709eaf268e3f2236187e17c9b854d0ccd1970bdf5834f93a771295aed33add10d5f240cea19be6ff8d57eda91ab7fb738afdb67f8095cca0b6e7b3dc4c8599f214428b9af2faa115933e3b0eba96e9d2fdab0603f39e460ed95b6ef4a6c6bea8ebdcd93e72e02796a09073e4f72e0dec0dea85ab498d4230b3b992f1c1179f37818721f814c1f38030007f0b32566db62fe1a7dfdafb7a76f17d80db358df3b876546bccbda4ea1c87876d800bb7b2186cb8d96d5d0cc0a1da9925d5bad8fe4f6dc9a44a471e14ab3d730a557c68006676db5fab5485731aa6b7523c43c15f1f0aa64d06e256098e9578e5e1ca15cf5fe07a2f4b75c6df9c452b70a93921e307f1839b5916cb9c662f962b65a41acfa46e27c58d38c0cea6040a26139efd0f88eb6fe76c3517e7167fb06dba80aa8dd8d20a3584d3f6cf5506332122d65547faba7ff30b110d3fb1a573bfac0af372ec11c8da38b51c061d353c5b94b9cc78e8da88f5c0fd8890fad8fa5db612eb28545cb4c3df9da8bb151089078441d039fc422ebb0b210758659bf336f6746702324413c15b8be25855de470fc3e3d14917a88760d131b39657d3215611fd06e94e3360d5782201b8b3caf5bd7854b15f98f6412de7426684240ddec39a804cc995562908c6ad724d25da0b67f9686b9eaa6c0fa8eb455a2c407e71ef9fa6ea199468542fa41ea2b431f147682b800a7140b42d88fb2f2d25f86bc819661b63eb6e3ef0e63c59ef58fcf078b5dba8b5f65e5e3c148d3aaff5baecfa8ad30fec920eb424f540570e21355ba7c77d5e2a69ae157380d90f90920a257f803247df2423165ce3c60069a402703b75d133ee15e38bc0ee6977d7531f9c4d0614e889994980e5674ef4f6c3070c6da831f0f0fcfd469c82647b83a7486cfd33213c3d44c3faf9ae3ba0eea80f4c4fcf837b0e5a1775cfaeb4552cf7eb931a56c959cda346c2af8b547077c26fb24216fdd7bcafd52a0c9e4859499859433edab5a7629e6d827cec7774859638dda0cf84b21f844b1c78211d87a1f27e255a169950d521cd8b14ef83e6bfd01ebdfe4c252c9aa38fe9d420ed4808be3bb95fc773e33323ddf88d9be507f0cf0091909ed43e19b35837e23a2e5b6e9b956ffbcd3144a81c6d39bde86813adca9c723f37ce946f0c9db5022ad896609db7ae408891922e89492945bff5a0ee2cd8369528ba542be715a7b2b6fa929ccfd4989ba01aec0293830b504e2729467d572ac260a411f81184b968529d65dc0d43b87a2829db7dc9ce087c20555b4ad9ad7b8e1f09778437fe43ed04c049df9f4e820bfcd977eefa6bdf4f0763d05c4a2d28efae0f96d2b67dcfb86f88dd00729a6a10f829e900100b89edec3bf1145fa8e34bc31b85e05ee09c3d870e7eccea322b149644ecb452c85eddd3acffe0f7d1c6351dfa6b99edc955ece620367d16a33f13104a2c16e9d6efbf4d42ef01bb893077d71c2442cc191e2574de4b8c14dcde542a1e2108ae098140a9e8a0a99375a0d6f4359ce252897ce2a82dc33fee480e62dedeb8ad0374f1e5a6487b4a928ffe166c099c046e3d77b140ef23c5e697a150fc441d3f9925058dee10e9ea98c04c4d7749d0e260f1c020dd89d71f016a51b4957091a407c5a8afa8a9ab871168ea80f78753452cde42895530e6ee55fe2dfbc167e89ba74d5b27b40529ede11089f8dd2fc88cd1852bcdb87f3b237ce67a2e0497982f1c36633706637fa0077e081341e919e5fe57a70b5168bf985ccca6166cff59caa459d94b7927fc27db3781fa98125346cbc7980c9229d9f7cb8beb1cfe77c70edfaf78e0415698f9ecc9e55611e806dbeb13e38e07a78c875bffc70a2c7e7fc2b04e960b9ce963e2c4f27caed9dc3ea553cb82a35d318993", 0x1000, 0x3, 0x1}, {&(0x7f0000000000)="6b658fed935eab465b870b795b3dec4912d2ef513a854ceec6894f3dbfe167ca129748dff3c578283f243a5ed198d00840bc497e858007bb1a7fbbf1ed509aaea888f136a1bb73a989822adf9d41bcc7d3883e0a483ec0a973128ab5dc8e5524027ff61e12c68c9456b51692d0b04e00122147a1f9c27aac2a13ca315b0fdcd679f5e2c5b87ba6a9dbd21590aab3d59eb5d46c408ce3c0f8303c1c66e2b4", 0x9e, 0xffffffffffff1d9a, 0x6}, {&(0x7f00000011c0)="e847de0bc2079c755e427dd40f004db1ab17a07063862324f37b9a2b95497d8baf68e7681e560a9357d9de7ffae817e67501d0c9f8bbec303e4a8a26b25fdea34d8c1d1a1bb64e15ef0613f2c691906eb2a955505c118165edeeedb2dbdef88705cb848c9c0c04369ebf56a5b42262322cac9655c2f00cc4b6c3c5e3ad9209d9008d3ff0e2d4f4cfa3cc535d45430cda1a10b1285cf312fb21deb04f1c9e4476cc7c56d64b3024e9c9d588673bd8e31232a16e1c04899dd73dd6157daf8e231a060665f1a2bb04aa", 0xc8, 0x9, 0x3f}, {&(0x7f00000012c0)="323ab90fc82373e3ad924c", 0xb, 0x10001, 0x3}], 0x2) 05:45:33 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) 05:45:33 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:33 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x2) 05:45:33 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) 05:45:33 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ptrace$getenv(0x4201, r1, 0x7ff, &(0x7f0000000280)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000002c0)={@id={0x2, 0x0, @a}}) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000b30013"], &(0x7f0000000000)=""/177, 0xcf, 0xb1}, 0x20) 05:45:33 executing program 2: syz_open_procfs(0x0, 0x0) 05:45:33 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x0) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:33 executing program 2: syz_open_procfs(0x0, 0x0) 05:45:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(r0, &(0x7f0000000000)="aa", 0x1) 05:45:33 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x0) 05:45:33 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ptrace$getenv(0x4201, r1, 0x7ff, &(0x7f0000000280)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000002c0)={@id={0x2, 0x0, @a}}) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:33 executing program 2: syz_open_procfs(0x0, 0x0) 05:45:33 executing program 0: kexec_load(0x0, 0x0, 0x0, 0x0) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:33 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ptrace$getenv(0x4201, r1, 0x7ff, &(0x7f0000000280)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000002c0)={@id={0x2, 0x0, @a}}) 05:45:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x1e, 0xf6, 0x1}, 0x20) 05:45:33 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x1f7b89dd) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000a00)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x4e23, 0x4, @loopback, 0x1}, r1}}, 0x38) 05:45:34 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(r0, &(0x7f0000000000)="aa6fb3a359a5334ad8fccf0c1c1b5886e1447e6adeae7bfafa3db6dd240c0d3b7ff457a945a656e658550264107c5740706ca32f67817e7694e743afb44b5edf68afcbe7d3bdeae3ef73a516b6830c2c26f4b1595248a5c921eaea9a3708dc80ef", 0x61) 05:45:34 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x3) 05:45:34 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) ptrace$getenv(0x4201, r0, 0x7ff, &(0x7f0000000280)) 05:45:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x1e, 0xf6, 0x1}, 0x20) 05:45:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x1e, 0xf6, 0x1}, 0x20) 05:45:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) 05:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:34 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) 05:45:34 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x3) 05:45:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 1) 05:45:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) 05:45:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:34 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x3) 05:45:34 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={0x0, &(0x7f00000000c0)=""/130, 0x0, 0x82}, 0x20) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) 05:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x7, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:34 executing program 0: write$dsp(0xffffffffffffffff, 0x0, 0x0) [ 1039.462112] FAULT_INJECTION: forcing a failure. [ 1039.462112] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.485830] CPU: 0 PID: 19228 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1039.493747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.503100] Call Trace: [ 1039.505691] dump_stack+0x1fc/0x2ef [ 1039.509380] should_fail.cold+0xa/0xf [ 1039.513184] ? setup_fault_attr+0x200/0x200 [ 1039.517494] ? lock_acquire+0x170/0x3c0 [ 1039.521457] __should_failslab+0x115/0x180 [ 1039.525678] should_failslab+0x5/0x10 [ 1039.529461] kmem_cache_alloc+0x277/0x370 [ 1039.533592] getname_flags+0xce/0x590 [ 1039.537396] do_sys_open+0x26c/0x520 [ 1039.541112] ? filp_open+0x70/0x70 [ 1039.544655] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1039.549999] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1039.555008] ? do_syscall_64+0x21/0x620 [ 1039.558966] do_syscall_64+0xf9/0x620 [ 1039.562751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1039.567924] RIP: 0033:0x7f170c37b024 [ 1039.571618] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1039.590499] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1039.598193] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1039.605445] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c 05:45:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:35 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1039.612696] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1039.619950] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1039.627202] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 2) 05:45:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@struct={0x1, 0x9, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}, {0x5, 0x2, 0x2}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x96, 0xf6, 0x1}, 0x20) 05:45:35 executing program 0: write$dsp(0xffffffffffffffff, 0x0, 0x0) 05:45:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) [ 1039.745483] FAULT_INJECTION: forcing a failure. [ 1039.745483] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.776862] CPU: 1 PID: 19245 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1039.784785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.794146] Call Trace: [ 1039.796748] dump_stack+0x1fc/0x2ef [ 1039.800397] should_fail.cold+0xa/0xf [ 1039.804242] ? setup_fault_attr+0x200/0x200 [ 1039.808585] ? lock_acquire+0x170/0x3c0 [ 1039.812579] __should_failslab+0x115/0x180 [ 1039.816825] should_failslab+0x5/0x10 [ 1039.820636] kmem_cache_alloc+0x277/0x370 [ 1039.824795] __alloc_file+0x21/0x340 [ 1039.828522] alloc_empty_file+0x6d/0x170 [ 1039.832597] path_openat+0xe9/0x2df0 [ 1039.836324] ? __lock_acquire+0x6de/0x3ff0 [ 1039.840576] ? check_preemption_disabled+0x41/0x280 [ 1039.845604] ? path_lookupat+0x8d0/0x8d0 [ 1039.849680] ? mark_held_locks+0xf0/0xf0 [ 1039.853754] ? mark_held_locks+0xf0/0xf0 [ 1039.857826] ? proc_fail_nth_write+0x95/0x1d0 [ 1039.862330] do_filp_open+0x18c/0x3f0 [ 1039.866140] ? may_open_dev+0xf0/0xf0 [ 1039.869952] ? __alloc_fd+0x28d/0x570 [ 1039.873770] ? lock_downgrade+0x720/0x720 [ 1039.877929] ? lock_acquire+0x170/0x3c0 [ 1039.881912] ? __alloc_fd+0x34/0x570 [ 1039.885643] ? do_raw_spin_unlock+0x171/0x230 [ 1039.890150] ? _raw_spin_unlock+0x29/0x40 [ 1039.894311] ? __alloc_fd+0x28d/0x570 [ 1039.898134] do_sys_open+0x3b3/0x520 [ 1039.901864] ? filp_open+0x70/0x70 [ 1039.905424] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1039.910799] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1039.915829] ? do_syscall_64+0x21/0x620 [ 1039.919817] do_syscall_64+0xf9/0x620 [ 1039.923633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1039.928829] RIP: 0033:0x7f170c37b024 05:45:35 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:35 executing program 0: write$dsp(0xffffffffffffffff, 0x0, 0x0) 05:45:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x6, [@struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}, {0xb, 0x5, 0x9e44}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x8a, 0xf6, 0x1}, 0x20) 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) [ 1039.932548] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1039.951450] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1039.959169] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1039.966456] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1039.973731] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1039.981009] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1039.988287] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) 05:45:35 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 3) 05:45:35 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x6, [@struct={0x1, 0x7, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}, {0xd, 0x0, 0x6}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x7e, 0xf6, 0x1}, 0x20) 05:45:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x6, [@struct={0x1, 0x6, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}, {0x9, 0x2, 0x7fff}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x72, 0xf6, 0x1}, 0x20) 05:45:35 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) [ 1040.176830] FAULT_INJECTION: forcing a failure. [ 1040.176830] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.231177] CPU: 1 PID: 19293 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1040.239094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.248451] Call Trace: [ 1040.251049] dump_stack+0x1fc/0x2ef [ 1040.254687] should_fail.cold+0xa/0xf [ 1040.258504] ? setup_fault_attr+0x200/0x200 [ 1040.262841] ? lock_acquire+0x170/0x3c0 [ 1040.266829] __should_failslab+0x115/0x180 [ 1040.271048] should_failslab+0x5/0x10 [ 1040.274829] kmem_cache_alloc+0x277/0x370 [ 1040.278971] __alloc_file+0x21/0x340 [ 1040.282671] alloc_empty_file+0x6d/0x170 [ 1040.286716] path_openat+0xe9/0x2df0 [ 1040.290412] ? __lock_acquire+0x6de/0x3ff0 [ 1040.294652] ? check_preemption_disabled+0x41/0x280 [ 1040.299677] ? path_lookupat+0x8d0/0x8d0 [ 1040.303726] ? mark_held_locks+0xf0/0xf0 [ 1040.307771] ? proc_fail_nth_write+0x95/0x1d0 [ 1040.312262] do_filp_open+0x18c/0x3f0 [ 1040.316056] ? may_open_dev+0xf0/0xf0 [ 1040.319850] ? __alloc_fd+0x28d/0x570 [ 1040.323643] ? lock_downgrade+0x720/0x720 [ 1040.327781] ? lock_acquire+0x170/0x3c0 [ 1040.331750] ? __alloc_fd+0x34/0x570 [ 1040.335464] ? do_raw_spin_unlock+0x171/0x230 [ 1040.339950] ? _raw_spin_unlock+0x29/0x40 [ 1040.344083] ? __alloc_fd+0x28d/0x570 [ 1040.347870] do_sys_open+0x3b3/0x520 [ 1040.351590] ? filp_open+0x70/0x70 [ 1040.355118] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1040.360475] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1040.365482] ? do_syscall_64+0x21/0x620 [ 1040.369453] do_syscall_64+0xf9/0x620 [ 1040.373263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.378446] RIP: 0033:0x7f170c37b024 [ 1040.382165] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1040.401062] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1040.408780] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1040.416035] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1040.423285] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 05:45:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@struct={0x1, 0x5, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}, {0x8, 0x2, 0x7fff}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x66, 0xf6, 0x1}, 0x20) 05:45:35 executing program 1: syz_mount_image$minix(0x0, &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1040.430607] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1040.437956] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 4) 05:45:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:35 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0xa2041, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@struct={0x1, 0x4, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}, {0xf, 0x1, 0x8}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x5a, 0xf6, 0x1}, 0x20) 05:45:36 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) [ 1040.578298] FAULT_INJECTION: forcing a failure. [ 1040.578298] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.614966] CPU: 0 PID: 19324 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 05:45:36 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) 05:45:36 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1040.622882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.632237] Call Trace: [ 1040.634837] dump_stack+0x1fc/0x2ef [ 1040.638473] should_fail.cold+0xa/0xf [ 1040.642295] ? setup_fault_attr+0x200/0x200 [ 1040.646631] ? lock_acquire+0x170/0x3c0 [ 1040.650618] __should_failslab+0x115/0x180 [ 1040.654868] should_failslab+0x5/0x10 [ 1040.658680] kmem_cache_alloc_trace+0x284/0x380 [ 1040.663367] apparmor_file_alloc_security+0x394/0xad0 [ 1040.668570] ? apparmor_file_receive+0x160/0x160 [ 1040.673325] ? __alloc_file+0x21/0x340 [ 1040.677202] security_file_alloc+0x40/0x90 [ 1040.681418] __alloc_file+0xd8/0x340 [ 1040.685114] alloc_empty_file+0x6d/0x170 [ 1040.689173] path_openat+0xe9/0x2df0 [ 1040.692872] ? __lock_acquire+0x6de/0x3ff0 [ 1040.697091] ? check_preemption_disabled+0x41/0x280 [ 1040.702089] ? path_lookupat+0x8d0/0x8d0 [ 1040.706157] ? mark_held_locks+0xf0/0xf0 [ 1040.710209] ? proc_fail_nth_write+0x95/0x1d0 [ 1040.714691] do_filp_open+0x18c/0x3f0 [ 1040.718477] ? may_open_dev+0xf0/0xf0 [ 1040.722262] ? __alloc_fd+0x28d/0x570 [ 1040.726045] ? lock_downgrade+0x720/0x720 [ 1040.730257] ? lock_acquire+0x170/0x3c0 [ 1040.734225] ? __alloc_fd+0x34/0x570 [ 1040.737919] ? do_raw_spin_unlock+0x171/0x230 [ 1040.742396] ? _raw_spin_unlock+0x29/0x40 [ 1040.746526] ? __alloc_fd+0x28d/0x570 [ 1040.750312] do_sys_open+0x3b3/0x520 [ 1040.754006] ? filp_open+0x70/0x70 [ 1040.757533] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1040.762885] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1040.767882] ? do_syscall_64+0x21/0x620 [ 1040.771840] do_syscall_64+0xf9/0x620 [ 1040.775624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.780964] RIP: 0033:0x7f170c37b024 [ 1040.784655] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1040.803541] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1040.811245] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1040.818510] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c 05:45:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@struct={0x1, 0x3, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}, {0x7, 0x1, 0x8}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x4e, 0xf6, 0x1}, 0x20) 05:45:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 5) 05:45:36 executing program 1: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1040.825765] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1040.833018] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1040.840270] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 [ 1040.875393] FAULT_INJECTION: forcing a failure. [ 1040.875393] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.886964] CPU: 0 PID: 19337 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1040.894859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.904214] Call Trace: [ 1040.906809] dump_stack+0x1fc/0x2ef [ 1040.910443] should_fail.cold+0xa/0xf [ 1040.914250] ? setup_fault_attr+0x200/0x200 [ 1040.918583] ? lock_downgrade+0x720/0x720 [ 1040.922737] __should_failslab+0x115/0x180 [ 1040.926984] should_failslab+0x5/0x10 [ 1040.930791] kmem_cache_alloc_trace+0x46/0x380 [ 1040.935385] proc_self_get_link+0x1c7/0x230 [ 1040.939714] ? proc_ns_dir_lookup+0x270/0x270 [ 1040.944221] link_path_walk.part.0+0xdaf/0x1230 [ 1040.948898] ? walk_component+0xda0/0xda0 [ 1040.953050] ? percpu_counter_add_batch+0x126/0x180 [ 1040.958081] path_openat+0x1db/0x2df0 [ 1040.961903] ? path_lookupat+0x8d0/0x8d0 [ 1040.965973] ? mark_held_locks+0xf0/0xf0 [ 1040.970045] ? proc_fail_nth_write+0x95/0x1d0 05:45:36 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:36 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1040.974550] do_filp_open+0x18c/0x3f0 [ 1040.978354] ? may_open_dev+0xf0/0xf0 [ 1040.982172] ? lock_acquire+0x170/0x3c0 [ 1040.986163] ? _raw_spin_unlock+0x29/0x40 [ 1040.990313] ? __alloc_fd+0x28d/0x570 [ 1040.994128] do_sys_open+0x3b3/0x520 [ 1040.997848] ? filp_open+0x70/0x70 [ 1041.001399] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.006771] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1041.011792] ? do_syscall_64+0x21/0x620 [ 1041.015773] do_syscall_64+0xf9/0x620 [ 1041.019584] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:45:36 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$dsp(r0, 0x0, 0x0) 05:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) 05:45:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@struct={0x1, 0x2, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}, {0x6, 0x3, 0x3}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x42, 0xf6, 0x1}, 0x20) [ 1041.024770] RIP: 0033:0x7f170c37b024 [ 1041.028483] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1041.047386] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1041.055113] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1041.062390] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c 05:45:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 6) 05:45:36 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 1041.069669] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1041.076935] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1041.084187] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) 05:45:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x1, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xf, 0x0, 0x81}]}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x36, 0xf6, 0x1}, 0x20) 05:45:36 executing program 1: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1041.224660] FAULT_INJECTION: forcing a failure. [ 1041.224660] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.260850] CPU: 1 PID: 19369 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1041.268769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.278126] Call Trace: [ 1041.280725] dump_stack+0x1fc/0x2ef [ 1041.284367] should_fail.cold+0xa/0xf [ 1041.288181] ? setup_fault_attr+0x200/0x200 [ 1041.292513] ? lock_acquire+0x170/0x3c0 [ 1041.296500] __should_failslab+0x115/0x180 [ 1041.300743] should_failslab+0x5/0x10 [ 1041.304554] kmem_cache_alloc+0x277/0x370 [ 1041.308713] __d_alloc+0x2b/0xa10 [ 1041.312178] d_alloc+0x4a/0x230 [ 1041.315468] d_alloc_parallel+0xeb/0x19e0 [ 1041.319628] ? __lock_acquire+0x6de/0x3ff0 [ 1041.323870] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1041.328034] ? __lockdep_init_map+0x100/0x5a0 [ 1041.332535] ? __lockdep_init_map+0x100/0x5a0 [ 1041.337045] __lookup_slow+0x18d/0x4a0 [ 1041.340942] ? follow_dotdot_rcu+0x1040/0x1040 [ 1041.345543] ? lookup_fast+0x4e9/0x1080 [ 1041.349531] ? walk_component+0x798/0xda0 [ 1041.353696] walk_component+0x7ac/0xda0 [ 1041.357680] ? lookup_fast+0x1080/0x1080 [ 1041.361743] ? generic_permission+0x116/0x4d0 [ 1041.366250] ? proc_pid_permission+0x1c8/0x290 [ 1041.370838] ? security_inode_permission+0xc5/0xf0 [ 1041.375776] ? inode_permission.part.0+0x10c/0x450 [ 1041.380719] link_path_walk.part.0+0x901/0x1230 [ 1041.385401] ? walk_component+0xda0/0xda0 [ 1041.389558] ? percpu_counter_add_batch+0x126/0x180 [ 1041.394586] path_openat+0x1db/0x2df0 [ 1041.398407] ? path_lookupat+0x8d0/0x8d0 [ 1041.402479] ? mark_held_locks+0xf0/0xf0 [ 1041.406541] ? proc_fail_nth_write+0x95/0x1d0 [ 1041.411047] do_filp_open+0x18c/0x3f0 [ 1041.414849] ? may_open_dev+0xf0/0xf0 [ 1041.418666] ? simple_attr_release+0x40/0x40 [ 1041.423093] ? _raw_spin_unlock+0x29/0x40 [ 1041.427246] ? __alloc_fd+0x28d/0x570 [ 1041.431060] do_sys_open+0x3b3/0x520 [ 1041.434778] ? filp_open+0x70/0x70 [ 1041.438331] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.443706] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1041.448730] ? do_syscall_64+0x21/0x620 [ 1041.452712] do_syscall_64+0xf9/0x620 [ 1041.456520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.461708] RIP: 0033:0x7f170c37b024 [ 1041.465418] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1041.484332] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1041.492138] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1041.499401] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1041.506655] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1041.513918] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e, 0x0]}}, &(0x7f0000000580)=""/246, 0x2a, 0xf6, 0x1}, 0x20) 05:45:37 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(0xffffffffffffffff, 0x0, 0x0) 05:45:37 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) 05:45:37 executing program 1: syz_mount_image$minix(&(0x7f0000000000), 0x0, 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1041.521188] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 7) 05:45:37 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(0xffffffffffffffff, 0x0, 0x0) 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) [ 1041.637615] FAULT_INJECTION: forcing a failure. [ 1041.637615] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.673587] CPU: 0 PID: 19402 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1041.681496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.690850] Call Trace: [ 1041.693445] dump_stack+0x1fc/0x2ef [ 1041.697100] should_fail.cold+0xa/0xf [ 1041.700913] ? setup_fault_attr+0x200/0x200 [ 1041.705242] ? lock_acquire+0x170/0x3c0 [ 1041.709229] __should_failslab+0x115/0x180 [ 1041.713475] should_failslab+0x5/0x10 [ 1041.717282] kmem_cache_alloc+0x277/0x370 [ 1041.721440] ? proc_get_link+0x230/0x230 [ 1041.725509] proc_alloc_inode+0x18/0x1a0 [ 1041.729574] ? proc_get_link+0x230/0x230 [ 1041.733642] alloc_inode+0x5d/0x180 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) [ 1041.737271] new_inode+0x1d/0xf0 [ 1041.740644] proc_pid_make_inode+0x22/0x230 [ 1041.744978] proc_pident_instantiate+0x81/0x310 [ 1041.749748] proc_pident_lookup+0x1c6/0x240 [ 1041.754089] __lookup_slow+0x246/0x4a0 [ 1041.757987] ? follow_dotdot_rcu+0x1040/0x1040 [ 1041.762590] ? lookup_fast+0x4e9/0x1080 [ 1041.766581] ? walk_component+0x798/0xda0 [ 1041.770748] walk_component+0x7ac/0xda0 [ 1041.774737] ? lookup_fast+0x1080/0x1080 [ 1041.778803] ? generic_permission+0x116/0x4d0 [ 1041.783312] ? proc_pid_permission+0x1c8/0x290 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1041.787911] ? security_inode_permission+0xc5/0xf0 [ 1041.792855] ? inode_permission.part.0+0x10c/0x450 [ 1041.797808] link_path_walk.part.0+0x901/0x1230 [ 1041.802497] ? walk_component+0xda0/0xda0 [ 1041.806652] ? percpu_counter_add_batch+0x126/0x180 [ 1041.811687] path_openat+0x1db/0x2df0 [ 1041.815517] ? path_lookupat+0x8d0/0x8d0 [ 1041.819598] ? mark_held_locks+0xf0/0xf0 [ 1041.823669] ? proc_fail_nth_write+0x95/0x1d0 [ 1041.828174] do_filp_open+0x18c/0x3f0 [ 1041.831982] ? may_open_dev+0xf0/0xf0 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1041.835798] ? simple_attr_release+0x40/0x40 [ 1041.840223] ? _raw_spin_unlock+0x29/0x40 [ 1041.844375] ? __alloc_fd+0x28d/0x570 [ 1041.848192] do_sys_open+0x3b3/0x520 [ 1041.851912] ? filp_open+0x70/0x70 [ 1041.855463] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.860834] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1041.865854] ? do_syscall_64+0x21/0x620 [ 1041.869838] do_syscall_64+0xf9/0x620 [ 1041.873653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.878842] RIP: 0033:0x7f170c37b024 [ 1041.882555] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1041.901459] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1041.909189] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1041.916463] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1041.923741] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1041.931012] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 05:45:37 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) [ 1041.938285] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 8) 05:45:37 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="150a93d037b985fdca0c9eda5c4b9e188478b53d5051bcb2d232e0cf4a3e6930446e3d9d752ac87ea1cefe44bdec9c030db73c34571f7608f24c543ab272c08c70f1a77899ef1689972c21e6a3", 0x4d, 0x7}], 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:37 executing program 0: openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0xa2041, 0x0) write$dsp(0xffffffffffffffff, 0x0, 0x0) 05:45:37 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:37 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:37 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:37 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1042.121832] FAULT_INJECTION: forcing a failure. [ 1042.121832] name failslab, interval 1, probability 0, space 0, times 0 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:37 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1042.198078] CPU: 0 PID: 19447 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1042.205987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.215347] Call Trace: [ 1042.217950] dump_stack+0x1fc/0x2ef [ 1042.221594] should_fail.cold+0xa/0xf [ 1042.225402] ? setup_fault_attr+0x200/0x200 [ 1042.229725] ? lock_acquire+0x170/0x3c0 [ 1042.233710] __should_failslab+0x115/0x180 [ 1042.237957] should_failslab+0x5/0x10 [ 1042.241761] kmem_cache_alloc+0x277/0x370 [ 1042.246030] __d_alloc+0x2b/0xa10 [ 1042.249492] d_alloc+0x4a/0x230 [ 1042.252786] d_alloc_parallel+0xeb/0x19e0 [ 1042.256957] ? check_preemption_disabled+0x41/0x280 [ 1042.261990] ? check_preemption_disabled+0x41/0x280 [ 1042.267020] ? __d_lookup_rcu+0x6b0/0x6b0 [ 1042.271183] ? __d_lookup+0x411/0x710 [ 1042.274994] ? mark_held_locks+0xa6/0xf0 [ 1042.279061] ? d_lookup+0x1aa/0x250 [ 1042.282703] ? d_lookup+0x18e/0x250 [ 1042.286346] lookup_open+0x4ea/0x1a20 [ 1042.290165] ? vfs_mkdir+0x7a0/0x7a0 [ 1042.293899] ? check_preemption_disabled+0x41/0x280 [ 1042.298932] ? path_openat+0x17ec/0x2df0 [ 1042.303012] path_openat+0x1804/0x2df0 [ 1042.306925] ? path_lookupat+0x8d0/0x8d0 [ 1042.310995] ? mark_held_locks+0xf0/0xf0 [ 1042.315064] ? proc_fail_nth_write+0x95/0x1d0 [ 1042.319588] do_filp_open+0x18c/0x3f0 [ 1042.323392] ? may_open_dev+0xf0/0xf0 [ 1042.327206] ? simple_attr_release+0x40/0x40 [ 1042.331631] ? _raw_spin_unlock+0x29/0x40 [ 1042.335787] ? __alloc_fd+0x28d/0x570 [ 1042.339605] do_sys_open+0x3b3/0x520 [ 1042.343324] ? filp_open+0x70/0x70 [ 1042.346876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1042.352253] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1042.357278] ? do_syscall_64+0x21/0x620 [ 1042.361265] do_syscall_64+0xf9/0x620 [ 1042.365079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.370273] RIP: 0033:0x7f170c37b024 [ 1042.373994] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 05:45:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 9) 05:45:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:37 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:37 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1042.392896] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1042.400612] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1042.407892] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1042.415165] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1042.422440] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1042.429712] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:37 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:37 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:38 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1042.561476] FAULT_INJECTION: forcing a failure. [ 1042.561476] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.625912] CPU: 0 PID: 19487 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1042.633826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.643192] Call Trace: [ 1042.645786] dump_stack+0x1fc/0x2ef [ 1042.649428] should_fail.cold+0xa/0xf [ 1042.653239] ? setup_fault_attr+0x200/0x200 [ 1042.657567] ? lock_acquire+0x170/0x3c0 [ 1042.661553] __should_failslab+0x115/0x180 [ 1042.665794] should_failslab+0x5/0x10 [ 1042.669600] kmem_cache_alloc+0x277/0x370 [ 1042.673753] ? proc_get_link+0x230/0x230 [ 1042.677823] proc_alloc_inode+0x18/0x1a0 [ 1042.681887] ? proc_get_link+0x230/0x230 [ 1042.685951] alloc_inode+0x5d/0x180 [ 1042.689583] new_inode+0x1d/0xf0 [ 1042.692958] proc_get_inode+0x20/0x680 [ 1042.696854] proc_lookup_de+0xdb/0x180 [ 1042.700749] proc_tgid_net_lookup+0x5e/0xc0 [ 1042.705078] ? proc_tgid_net_getattr+0x160/0x160 [ 1042.709858] lookup_open+0x698/0x1a20 [ 1042.713674] ? vfs_mkdir+0x7a0/0x7a0 [ 1042.717408] ? check_preemption_disabled+0x41/0x280 [ 1042.722435] ? path_openat+0x17ec/0x2df0 [ 1042.726510] path_openat+0x1804/0x2df0 [ 1042.730416] ? path_lookupat+0x8d0/0x8d0 [ 1042.734485] ? mark_held_locks+0xf0/0xf0 [ 1042.738548] ? proc_fail_nth_write+0x95/0x1d0 [ 1042.743057] do_filp_open+0x18c/0x3f0 [ 1042.746869] ? may_open_dev+0xf0/0xf0 [ 1042.750677] ? simple_attr_release+0x40/0x40 [ 1042.755097] ? _raw_spin_unlock+0x29/0x40 [ 1042.759246] ? __alloc_fd+0x28d/0x570 [ 1042.763076] do_sys_open+0x3b3/0x520 [ 1042.766795] ? filp_open+0x70/0x70 [ 1042.770348] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1042.775717] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1042.780741] ? do_syscall_64+0x21/0x620 [ 1042.784721] do_syscall_64+0xf9/0x620 [ 1042.788532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.793726] RIP: 0033:0x7f170c37b024 [ 1042.797440] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1042.816346] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 05:45:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 10) 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}, {'\x1c\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:38 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1042.824063] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1042.831337] RDX: 0000000000000002 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1042.838607] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1042.845869] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1042.853143] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) [ 1042.909608] FAULT_INJECTION: forcing a failure. [ 1042.909608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1042.921452] CPU: 0 PID: 19512 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1042.929333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.938689] Call Trace: [ 1042.941291] dump_stack+0x1fc/0x2ef [ 1042.944937] should_fail.cold+0xa/0xf [ 1042.948840] ? setup_fault_attr+0x200/0x200 [ 1042.953169] ? is_bpf_text_address+0xfc/0x1b0 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1042.957681] __alloc_pages_nodemask+0x239/0x2890 [ 1042.962450] ? __lock_acquire+0x6de/0x3ff0 [ 1042.966697] ? __lock_acquire+0x6de/0x3ff0 [ 1042.970948] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1042.975885] ? lock_acquire+0x170/0x3c0 [ 1042.979866] ? debug_object_activate+0x12f/0x450 [ 1042.984637] ? check_preemption_disabled+0x41/0x280 [ 1042.989664] ? __pv_queued_spin_lock_slowpath+0x23f/0xae0 [ 1042.995211] ? cache_alloc_refill+0x1da/0x340 [ 1042.999719] cache_grow_begin+0xa4/0x8a0 [ 1043.003795] cache_alloc_refill+0x273/0x340 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) [ 1043.008129] kmem_cache_alloc+0x346/0x370 [ 1043.012292] getname_flags+0xce/0x590 [ 1043.016102] ? task_work_run+0x64/0x1c0 [ 1043.020085] do_sys_open+0x26c/0x520 [ 1043.023803] ? filp_open+0x70/0x70 [ 1043.027367] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1043.032744] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1043.037769] ? do_syscall_64+0x21/0x620 [ 1043.041758] do_syscall_64+0xf9/0x620 [ 1043.045570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1043.050767] RIP: 0033:0x7f170c37b024 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1043.054482] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1043.073472] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1043.081196] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1043.088471] RDX: 0000000000000000 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1043.095746] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1043.103026] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, 0x0) [ 1043.110304] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 11) 05:45:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:38 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, 0x0) 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:38 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, 0x0) 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) [ 1043.271672] FAULT_INJECTION: forcing a failure. [ 1043.271672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1043.283619] CPU: 0 PID: 19553 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1043.291511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1043.300868] Call Trace: [ 1043.303465] dump_stack+0x1fc/0x2ef [ 1043.307105] should_fail.cold+0xa/0xf [ 1043.310915] ? setup_fault_attr+0x200/0x200 [ 1043.315245] ? is_bpf_text_address+0xfc/0x1b0 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}, {}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1043.319757] __alloc_pages_nodemask+0x239/0x2890 [ 1043.324536] ? __lock_acquire+0x6de/0x3ff0 [ 1043.328794] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1043.333643] ? lock_acquire+0x170/0x3c0 [ 1043.337617] ? debug_object_activate+0x12f/0x450 [ 1043.342380] ? __lock_acquire+0x6de/0x3ff0 [ 1043.346628] ? lock_downgrade+0x720/0x720 [ 1043.351386] ? lock_acquire+0x170/0x3c0 [ 1043.355368] ? debug_object_active_state+0x104/0x330 [ 1043.360480] cache_grow_begin+0xa4/0x8a0 [ 1043.364551] ? setup_fault_attr+0x200/0x200 [ 1043.368875] ? lock_acquire+0x170/0x3c0 [ 1043.372856] cache_alloc_refill+0x273/0x340 [ 1043.377187] kmem_cache_alloc+0x346/0x370 [ 1043.381344] getname_flags+0xce/0x590 [ 1043.385151] ? task_work_run+0x64/0x1c0 [ 1043.389132] do_sys_open+0x26c/0x520 [ 1043.392850] ? filp_open+0x70/0x70 [ 1043.396401] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1043.401779] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1043.406799] ? do_syscall_64+0x21/0x620 [ 1043.410780] do_syscall_64+0xf9/0x620 [ 1043.414596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1043.419793] RIP: 0033:0x7f170c37b024 [ 1043.423527] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1043.442444] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1043.450164] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1043.457443] RDX: 0000000000000000 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1043.464725] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 05:45:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 12) 05:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}, {'*-\''}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x1c, 0xf6, 0x1}, 0x20) 05:45:38 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1043.472002] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1043.479280] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 1043.573027] FAULT_INJECTION: forcing a failure. [ 1043.573027] name failslab, interval 1, probability 0, space 0, times 0 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}, {'!B[/!@{%$'}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x1c, 0xf6, 0x1}, 0x20) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1043.620453] CPU: 0 PID: 19584 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1043.628370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1043.637729] Call Trace: [ 1043.640333] dump_stack+0x1fc/0x2ef [ 1043.644009] should_fail.cold+0xa/0xf [ 1043.647829] ? setup_fault_attr+0x200/0x200 [ 1043.652166] ? lock_downgrade+0x720/0x720 [ 1043.656329] __should_failslab+0x115/0x180 [ 1043.660578] should_failslab+0x5/0x10 [ 1043.664396] kmem_cache_alloc_trace+0x46/0x380 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x1c, 0xf6, 0x1}, 0x20) [ 1043.668993] proc_self_get_link+0x1c7/0x230 [ 1043.673330] ? proc_ns_dir_lookup+0x270/0x270 [ 1043.677836] link_path_walk.part.0+0xdaf/0x1230 [ 1043.682524] ? walk_component+0xda0/0xda0 [ 1043.686682] ? percpu_counter_add_batch+0x126/0x180 [ 1043.691721] path_openat+0x1db/0x2df0 [ 1043.695545] ? path_lookupat+0x8d0/0x8d0 [ 1043.699620] ? mark_held_locks+0xf0/0xf0 [ 1043.703689] ? mark_held_locks+0xf0/0xf0 [ 1043.707754] ? __lock_acquire+0x6de/0x3ff0 [ 1043.712009] do_filp_open+0x18c/0x3f0 [ 1043.715815] ? may_open_dev+0xf0/0xf0 [ 1043.719646] ? lock_acquire+0x170/0x3c0 [ 1043.723642] ? _raw_spin_unlock+0x29/0x40 [ 1043.727800] ? __alloc_fd+0x28d/0x570 [ 1043.731625] do_sys_open+0x3b3/0x520 [ 1043.735347] ? filp_open+0x70/0x70 [ 1043.738897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1043.744268] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1043.749292] ? do_syscall_64+0x21/0x620 [ 1043.753278] do_syscall_64+0xf9/0x620 [ 1043.757087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1043.762279] RIP: 0033:0x7f170c37b024 [ 1043.765998] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1043.784901] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1043.792623] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1043.799898] RDX: 0000000000000000 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1043.807175] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 05:45:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 13) 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}, {'\xfb!'}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) [ 1043.814455] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1043.821730] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}, {'\'3({*\'('}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x0, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1043.952541] FAULT_INJECTION: forcing a failure. [ 1043.952541] name failslab, interval 1, probability 0, space 0, times 0 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[{']%.},'}], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) [ 1044.014102] CPU: 0 PID: 19624 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 1044.022016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1044.031375] Call Trace: [ 1044.033972] dump_stack+0x1fc/0x2ef [ 1044.037612] should_fail.cold+0xa/0xf [ 1044.041430] ? setup_fault_attr+0x200/0x200 [ 1044.045757] ? lock_acquire+0x170/0x3c0 [ 1044.049740] __should_failslab+0x115/0x180 [ 1044.053981] should_failslab+0x5/0x10 [ 1044.057788] kmem_cache_alloc_trace+0x284/0x380 [ 1044.062468] apparmor_file_alloc_security+0x394/0xad0 [ 1044.067671] ? apparmor_file_receive+0x160/0x160 [ 1044.072435] ? __alloc_file+0x21/0x340 [ 1044.076343] security_file_alloc+0x40/0x90 [ 1044.080589] __alloc_file+0xd8/0x340 [ 1044.084313] alloc_empty_file+0x6d/0x170 [ 1044.088384] path_openat+0xe9/0x2df0 [ 1044.092104] ? __lock_acquire+0x6de/0x3ff0 [ 1044.096359] ? lock_acquire+0x170/0x3c0 [ 1044.100336] ? path_lookupat+0x8d0/0x8d0 [ 1044.104411] ? mark_held_locks+0xf0/0xf0 [ 1044.108475] ? __lock_acquire+0x6de/0x3ff0 [ 1044.112721] do_filp_open+0x18c/0x3f0 [ 1044.116532] ? may_open_dev+0xf0/0xf0 [ 1044.120338] ? __alloc_fd+0x28d/0x570 [ 1044.124156] ? lock_downgrade+0x720/0x720 [ 1044.128318] ? lock_acquire+0x170/0x3c0 [ 1044.132294] ? __alloc_fd+0x34/0x570 [ 1044.136012] ? do_raw_spin_unlock+0x171/0x230 [ 1044.140521] ? _raw_spin_unlock+0x29/0x40 [ 1044.144676] ? __alloc_fd+0x28d/0x570 [ 1044.148488] do_sys_open+0x3b3/0x520 [ 1044.152213] ? filp_open+0x70/0x70 [ 1044.155765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1044.161140] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1044.166158] ? do_syscall_64+0x21/0x620 [ 1044.170140] do_syscall_64+0xf9/0x620 [ 1044.173949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1044.179136] RIP: 0033:0x7f170c37b024 [ 1044.182851] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1044.201754] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 05:45:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 14) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x0, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}, {@pcr={'pcr', 0x3d, 0x30}}]}) 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 1044.209476] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1044.216748] RDX: 0000000000000000 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1044.224006] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1044.231267] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1044.238520] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) [ 1044.296504] FAULT_INJECTION: forcing a failure. [ 1044.296504] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.333861] CPU: 1 PID: 19651 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1044.341775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1044.351132] Call Trace: [ 1044.353734] dump_stack+0x1fc/0x2ef [ 1044.357396] should_fail.cold+0xa/0xf [ 1044.361224] ? setup_fault_attr+0x200/0x200 [ 1044.365589] ? lock_downgrade+0x720/0x720 [ 1044.369744] __should_failslab+0x115/0x180 [ 1044.373991] should_failslab+0x5/0x10 [ 1044.377803] kmem_cache_alloc_trace+0x46/0x380 [ 1044.382396] proc_self_get_link+0x1c7/0x230 [ 1044.386722] ? proc_ns_dir_lookup+0x270/0x270 [ 1044.391222] link_path_walk.part.0+0xdaf/0x1230 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1044.395902] ? walk_component+0xda0/0xda0 [ 1044.400052] ? percpu_counter_add_batch+0x126/0x180 [ 1044.405086] path_openat+0x1db/0x2df0 [ 1044.408906] ? path_lookupat+0x8d0/0x8d0 [ 1044.412974] ? mark_held_locks+0xf0/0xf0 [ 1044.417042] ? __lock_acquire+0x6de/0x3ff0 [ 1044.421286] do_filp_open+0x18c/0x3f0 [ 1044.425083] ? may_open_dev+0xf0/0xf0 [ 1044.428893] ? lock_acquire+0x170/0x3c0 [ 1044.432875] ? _raw_spin_unlock+0x29/0x40 [ 1044.437026] ? __alloc_fd+0x28d/0x570 [ 1044.440837] do_sys_open+0x3b3/0x520 05:45:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pcr'}}]}) [ 1044.444555] ? filp_open+0x70/0x70 [ 1044.448103] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1044.453474] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1044.458492] ? do_syscall_64+0x21/0x620 [ 1044.462473] do_syscall_64+0xf9/0x620 [ 1044.466281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1044.471467] RIP: 0033:0x7f170c37b024 [ 1044.475178] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 05:45:39 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x0, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) [ 1044.494077] RSP: 002b:00007f170ad3d040 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1044.501791] RAX: ffffffffffffffda RBX: 00007f170c4daf60 RCX: 00007f170c37b024 [ 1044.509064] RDX: 0000000000000000 RSI: 00007f170ad3d0d0 RDI: 00000000ffffff9c [ 1044.516340] RBP: 00007f170ad3d0d0 R08: 0000000000000000 R09: 00007f170ad3cf50 [ 1044.523614] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 1044.530884] R13: 00007ffe4ac9ebaf R14: 00007f170ad3d300 R15: 0000000000022000 05:45:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (fail_nth: 15) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[], [{@obj_user={'obj_user', 0x3d, ',#'}}, {@obj_type={'obj_type', 0x3d, '+&-],%--&8%^$'}}]}) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)={[], [{@obj_user={'obj_user', 0x3d, ',#'}}]}) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, &(0x7f0000000300)) 05:45:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6}, 0x20) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6}, 0x20) 05:45:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, 0x0) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async, rerun: 64) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (rerun: 64) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1900400, 0x0) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x30, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6}, 0x20) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 2: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x44000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x1}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x44000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x44000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x44000) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) 05:45:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:40 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:40 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) 05:45:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:41 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000580)=""/246, 0x0, 0xf6, 0x1}, 0x20) 05:45:41 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:41 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', &(0x7f0000001640)=[&(0x7f00000015c0)='}+', &(0x7f0000001600)='uid<'], &(0x7f0000001840)=[&(0x7f0000001680)='\x00', &(0x7f00000016c0)='0{,\x00', &(0x7f0000001700)='}/@\x00', &(0x7f0000001740)='uid<', &(0x7f0000001780)='omfs\x00', &(0x7f00000017c0)='/dev/vcsa#\x00', &(0x7f0000001800)='}+'], 0x1000) r0 = syz_mount_image$omfs(&(0x7f0000001880), &(0x7f00000018c0)='./file0\x00', 0xfffffffffffffff8, 0xa, &(0x7f0000002ec0)=[{&(0x7f0000001900)="880ba4430119a8ac120afbb7642b7238114391aaba474bfd704accee8c6f8aa796a388d958c5720f5f7b3b8be8a5292fae8046c2f8a6f5103872820af2dcacc0dee8b3a687ca148ce96bb7253c8cf3ee2120224564bb20e012014ad4da7b16cfed6b08b22edaa7ea982a24eb685e80936a7de07dd49dd069f48708954545882643a14ea930f434d04a6a502298a092a2e3d35d29de4c7fcd33ee26", 0x9b}, {&(0x7f00000019c0), 0x0, 0x8000}, {&(0x7f0000001a00)="dcf1b7aa3d93741f29c3e21a52f2002b77f44e4563734bc7", 0x18, 0x7}, {&(0x7f0000001a40)="2399aa9916903f67e3e3a5f31ff07ebc36bc8c6367a1af296ca7931df141dcaf6bd4a424ce300ac2c98682698f849d2d353ad227a760e64aa6ed79193476ecae47d9681ff46cbe0023f8d3a687a9ecae2f19669c86b05e45f96ecaff489746eed62e291d0b112079f336a80068723ccb9824093557537d1197baba34c6bd81351417ad5cce9fe228d342f97901517fce8932c91254a5e90068a3adb9f7548c52e123b126b369fa3639f8645d85700e380ae85567fd4a4c1f2f36631e326a6726fcda372bab301fca9d35bee31a34bf0923a01ba8d378e9c553cb6fece311ddb1ad47ae8b64", 0xe5, 0x2}, {&(0x7f0000001b40)="57858bcbd7ca3820b297409a5fd1f149cd0c27093ea980300177606f531fd26bf6c8e82396598aa4832d2a16b0ad92748d4a75d3017d3dc9e649b4128e2b982997786a5fde92a95945c2564e749fb7e2f9f2e0b7554091fc2d43ae3960b4060a7f2c20dad93ccb598df71c3ff52b50b104ca280109629a8d3c6b72393ee2ce72ab43ae", 0x83, 0x7}, {&(0x7f0000001c00)="f25632db98d53d9a7aa9900c416b3f151012a7dd5080bace3301e07e0517aa6aa907be7db0dee73d7b1bf92ce1932e80767f172212ac3457", 0x38, 0x5}, {&(0x7f0000001c40)="ef9fb322f4a2cddc803db54ae21e978523e14fa2747bcdaf7d2616d960785f6f5d421e87dcdfa986e9656ae5494cf38e5741e55f6bd7e773eeb5519f32bec3af928366df53d5b8bd5e36856033b66ff45c0b1bf5c12dc94ed1c7a2a9f872333188c547bce89597c0201526bc1df4e1c3dac71ccebcb99481f09d6c97f5a0346b6356e41158f5d1195b5a8fd89014f76f9b10ef00eac294c87bc41444d3b781b8864b72a721842732dfbcafcf05fd73e6646f1d368422d8d044d1f549e537c6eefef4dd1b9ba5e675ec64ed205e20da73e24169fd18fc611a3ecc1f17d7c6471392e776f75d4dcac99aef451fb027586d369fd66707e17684856ee667ca29454830b531d5c51091dcab7defba2d75b7ec49fbb1d39ce7d975dde9b0f2157a43a1ba7a35cdb40c3688e343e3980e748f0ccb2be200afb022a2ffeab6eab3d27fbda1ace6ce60d47a942ce609ddf113e175d645ed60168dce1c1be3a693993d9ec55b59566714f0642c6d043209d0f54d6a5c33f6668786cb56a43b4ae5c54195fc6cae3f05931085036ed3af4a49a3e8e3f7c893ebdcaa4b5571e1e65ab05a4c172132508a5fbbb3de9687ec1d837d37b1b9fdabe2fb41579328a7a5d3655f88176a929934e632b54c5e8e46c94a627590d548a8efa9c73e100d64ce4cfef1ca33b9a597b771b8b4431431acd76c18584441d695af581154d549c60f1ff9ecf2b1fa2dbc155d323227895096e7702cc3d2849b276a14a8df0388ef2ba4c0fc342a253c52e4af34bd1610579341fe57e682b7cb8ddcaa048cf1561745c316148c39777533a17e608f09df7b05af169566ad3d182bfdf07281afeca025a967b43fd1158967e102e36a4f5ad02e89b231c3c2a6abfbcbe3e19fe25383dd92812f64aaad7abad346300cb4bb0f209431b9d0ec3e510dabdd7b8373b8bf72e1080c527a665da7e7c09468a98cf64219111f4fa8233d2711b8290a85a53831e490b6aec07700ba9478920277a94e64c2c7462263de866056ed7ab4a5eaca263b6a7fcdd9e6ba5a01e57ae19a6a9c3d5f60f5606543a8a6817906802f082975808eeed0de8fb47eb6347f433391f995151d6cd2572018644138350376f87f997b1f371bc2c762b6c310fa1ecb68750f89c59b70176b8e396ae0104ffce22f6f6b08466b79692dc3ea2a75cd26e09c37f5eb6e81c3d94ddd3a82f4e51477c6e3cfd85cdd96626feef10e814e2c2cdb5a521f1ea189cdc65d03c9dc5948380ac24404f5d27e3ddb79afd719698325361cec07113b30d6907b6a8469d30c9f71f9d467b076719924206d80580fb059c29d64f5ea8129bf54bdbe758fb1838d338adb57b0e5aa027aa43c021c56778ad84201d9de210bf36e67411a44e8a6b3f4332a045c438f111e8cf466727e227999146fde5263c4a17aa536ac30d0527b51f7edb9ad0c82989432063d2de417b7f546f9fdc69f8adc3a9679f88b136cdb37ccfb74a5833ceaba4d4b73ed8261043f48e4dd95c7f10a70525f8a4e0b2b3037c10e7a8fce29bd0346ab239554632d8f06dc83608aac4ffedc1bfb7e4a17edf0bb30e2de207cf195633a6cb41c6f650eae54fc9c2e62328ada0299ee85d71c57801b4f5448c7c61faa0c3886f269a0cc4cc19bea77894acab724b4640ac09a6bfa3300934bb3a60931f9cb1372b387a4211069cd5eb489c52210df0107fc507e6c041935bb96b22636c0a1dfde0b54bbbc3c0c1a728b56fe45881ea1fea9fb686ac4303e89cf86ae41ae7126f9a4b5d38865e3d44981e11fca696feae637e2eb7a1d7b31ccc921496166cb15d95c49bd6a080d085530bfc0a6eb2f48b38a50e8d9d7b0ac86178b96cf0f0bfa03bcba3ffa9441970962c34b113bc528926c2c2b7ab264ab6eadab647237da6ce875c76d962204dbf512d26384c0b1a4c45d8ca31095ca533f1a60cdb5109b3eb2dc108306d99cb436419555d79b6f702b15efff8ace8b185ff6c4e84deafdb7b9ee4c2ce045b6bf6bb456ff8a8b1d8782d5990f3754070663e1b60db4e199828beb5cd161e5a1825724018344b4eeb128ea796a74f96c4664c12377b630922e2e33d7abd08b23babe895d0f2aff9cfb2817151600c031df98b067cfad1da1882424df175571d56c6f605f0118c61744329816afa7ef165945e2a5018c4ac17f9a40fa7f507007fd5a8b1edf07d7f57c996690d399c1b8f2b357aa64fca90785c03e6292e9b3b6d2b77985f2d8e954f4a1b6b0ee69fef084271b814f3f78ae444a0b06419a5905c7700f27519b1e67aabe64c6bf5a50cf105d8da7056ac2ed96bb7c52d39d0d5c6add1b55f746ae9baeaa8d14dc7e7a7e20f120fbe2a04a89f2d12f5437e46863520a69661748d83908e3ea250d3a5bd585e928b79cabad2071ebb065a0ecbab492b2b3df9329af60e49978db180243c3c2fe48ba64bdb0690a208ef928bf71969ba9964bfd7a4f1e18054a8a57c720df6c8284a9081c63868f64c8e462d89baba969e27a1ff36282ac48bf90d94a5605201f156a90fbe4da8af7ba3d37c010bd740dcfa8c7126c4cc87bebbe668369a5c3940db254a0a9b7d487ed224d10a6db2b7d0955f0ec1a4a062ebba6cd571af23fa23e28c7a149104d99578939544cd23a06083a4bb9af62947b2cf7805e168ad191925989b766344107082231c7675825411c4e4ef0990aa1200b642cab4dbae28168b2240652a89e6a65cd0e70c0128883b46b0d1d66721b5efe5bcfea4814d1ffb6ced84e2244227eaa57bb303e36ca97bb8c3c5c5d51e5cf78537535b60ef4ac138095a4c4ee13c1a9fce1f19ef7fa03949e91002d21941f108d83f64a89f5916d7f98e87807d80752766b9d7ddf4b20d884339339eb0864fdd81bb6dfa20e8a20f02e018de40d97a591f1bfecd85d452098ae45e99502747125b2312c57223530475ef8a59b7afc53978ff2a624634cf11cdd533da4dfec9d03220e428574dbe5d9030e8da26f2b0ed3fc3e2c8761a00140418db88e43e6af0731296aa6181dab0ac7967b2efdd476ab48f06613e45daf726061ade2cda897dcbbf3805a0c7deb804af7f81fcadf839e4ee06120725c065b8a0e5a474a551b53370d614539a30404ab85ccaabd27643ff528f01084e127076af7b6cd03864569b20bff4f94583fc1f6fe4af30d61214cf0839220ec10020ac743407299a0d6867a5c70bfe91aff763fdc8920f2c4744771ec599c935ff885c7702181eac32c60b0c77203c974d8742fe1b4abd6b8ca9ec4d66b7255c16ab419de61727d8672be933483afd7a5ff85565faef4b6906e99e423c7c700b9812ec2ae17bea1c486ab5eafd212a6e8f5fa3941d9cc09a7d0ffdcbeb9ebef575604cd659039eb2fbbe71e52444da6770a923b25674286fe24e6c742e7dfb3e8c5731c33e244a9e993dc2fb19629a8f20f03120a18826abacae5ec61cfacd816d2db6c6542ff4e868650f568d2a1c2b085cdfcd41fa8e0a1de55a784e09c4b42dd50be5ae76026ea1fe59e0bb2c1a1163ab0bfd02bf7d40ba977311a642490b0a68eb19008eb1418c54df83e3d75a255c226111aecdfddfe6ee4f73a6ef9429e850c94a54fa57ef01f4332b9002b9c492dd0d3e9b543ff951be790effe3c9b840014d08c33997a4f0c3fd47be45f1f6842ff58ddcd7434278354b0312c7db26b44918584804214c61ef18f2eacbc596e3919163ab6efc5f33af248dc8f1d337e6c298d722ce231077fecb6bb60c7760f4785055a4a9ed191c0ada70a2aa192c710b8d725bb6ab7f723d617f3990a15e430246bc2cf5c40fc8023ced6d6f976990eed5750aff76e07beedf32ee74387bdefd6e9fa08b22b5c5a828f21ef3441c4f0c65bb562628f8fa8107e122af9b9f64ca5e63988e5359c9667d6041f971e51899b116cb3f89f6ce7646ab27471a17c31f185aaafd3cb97b6142d595eb0d1a8b04d356c613634f852a5f1597fa89c46a3309160500ccde330146c22c9840dc35197c88ab6b8ca45ffcdf38f3e9295da45f7121b8040fb9b9bfcc2669cd06f21720a42985066150aadfdb021f11597b1e2836d0fa47306880e8fdde9cb401c51f3008a37bba0b2f153ebb9badf58910bf29c0a421e039bfba544c2212eb689e0c3616367cdc725444f53e12aba0247924c6618861972fb259107f9dfbb9ac39612f2d283807021c6a8dfd3a0e87ce26c93482e301db89f3e079aacac1ad79bddc1bc3c7a34f3e1e74478d4d46f96ac4b572cebc3f8e960b3766f5266f1dde17f6a69d8c97d32cec979c5196c2dc7892e549ba62aee1eb36a51d4c6395e4c8774589d56c7a9fe5a52e8ab7c00fb21605676ad21541442d7134efa29d2f5cbeb7a96618b79c177f6ecc9ce201fe46b9b47741068f3818bc473bc31e858b4cf423b68f7871b069458c0e9933b00db3e25324884242f772d6484efa4381f1a33b41dbe7728bcb4236326cc4149dd1567894922c7ea3f7bbb36ced9e3dbb7f77add921fc3293ddc9852a73b79bfa6814d1ecbe01c3e30dc01eea89800850ea76c6d8c24d2eb98c82d3919172136a69c1409fcaf282c887245635cb9f0bc62be1bfb4f9521ba5a134ec01f2abd560d7490e6e362c71786190585a194eb83ff75025ebc042e52a72dafe184898e63ec7007c111a3d62ba826bd2f4fec489bef66a461981baceb55225d2571574503ae7de50a774b42975e79d45ab4d577cd6c353ce5511dd26384b7a3d28023cc0c54cbafc1371f7d9a135ef6148d54a0d240b702bc24e3867d1cec20f8acd827e35dc9554b732ceea137efd22c0fd516ed99b0ade7d6807ef08665ab26b72ae0feb8c7b779574e4fd879c98106943b39641362222adbe1ea52a1f84601359bcd73194a8d55238932deaa7dd734eea4fee05b77f06f91d523b48e97f20b9ca6492176243e1e500f91e18f0bcfb648a8f40a01e6b866fdfd3a60e8292537b74872ab9cbb4f27edeba063d85daf4a6563ecde84c3fd71aa44c62fe44e3e49d4f476153d01bd94ab231cb56c1a28d5728c826e1e87339dd3037559ab184884d72ebfe9846c4810f4e049dd080ec19b2d0b03f11d8518c3cc3487bccb525bbb9f2daa4b3d03e1883c7e09955b6e185648ef7532fe31ac2e2ca1f84717452cc08d526e0d0007403111c089b06c3a9f8b49809f6041aa50caa31183b64b354a2414ba5217e8ba11045d84a1d305c83dbe74b154b2f383b23110b8d9c999f0c06ed0625b58487efe6a9feb4addd32cbdbabe66842527e88dc8be1a114ee53ed6981e82dfffbb999d23b815fa522cbcfb76fa41de683ba9d85bdcc7384e96b26ff58389f1d22068700288c5e779dba35ff3109b232aa21698e146b115de4071b05686df23935fd2e1c851c783f70be63ce6e2d47a84bdaa6f4ab87d0eb47d9a5342ec93c2290a3390304dfc30fecbf17ca43dc7ea22a7a06798a6169ba4f057cee1c6ea621165ae6cfb26934b0ed5d0d7fc508bb0a9c13f619d8c6bd0b0c20a4f9de0d75262a205f3bed102cda06ed4747bacd5ee5e73a468d94cbdacded2c96011e28f844ddd27b4c815e5a9e1302090fef98c88be4c259f632130e7268ba89abde241bda87ea245ea518e52ec2790054dc370349b0f4b3b224d256966caf4246992e54ae1ee7d3401f5acbc483db76be56d347079af698173a3360680b7d8e2b2a1db3f9630f2232faa2ca0b21717b90331bced053542934be47217887222a4958fdd0e3c752f6cbb6b7990bf5c17a69ffb84bf7e0b5042739e747c128efdf2d98c2bf6f0a8fbc8bf594a", 0x1000}, {&(0x7f0000002c40)="eae19ec30fc3998e2d875c1828f12834ecb07287def7c75583477a74029fa23445b3c9e6d4621f1740edc2305c141aacf1c6a1eeab7fd40cc0a8203dcaebdfc229634571e9d6a2c7c2475b79b9b6584baa6cbe73cabcb45dba969ab5ed94648d1de680a2d2f6eb80fc9da274338bdc302ca3d7c5c22daddce22ac54394a3ffe3ad5774bcda2ad0718c4ad66932545092a0317e34a3507c4ce2d7d5", 0x9b}, {&(0x7f0000002d00)="31468b8b3f48d7127862077e87dc7fa0bf4c5833c16ddef8450a0b48f4965764f58e3219e32434e783f539a2d7868a658c14368333ad32372e50ebb42fdc62fc1303362502f82ad67cc775fe33afc421db837b18a874fb8998c6a8ce8a74ed1a6b93319a8157a5879299f5502f43d325dcb4be2c7fc52153140038bb88e539cf10db159d77d90e079925bae6b2f62913684729b9b62b71dec3e4ce1799fafc816c4a5e981ac98c8ace5d9ed71e2dcc55eb8c4fa47907efc3f246276a365a9613958f661332545a74553a8b0cbb752b787ff7e5503ef1111447ac77450b882cbbdc4d990423ca3947b3db", 0xea, 0x7fffffffffffffff}, {&(0x7f0000002e00)="17c2cde9a27359ea443ea7cffd688f8ff1d80c2ac80a8fb5a89e007b62fd6e7e23b33f075dbdbb5a92270f86d60b287e987ed3258f0fe06c95b4e3b17998219d0cd55fcd75c33a701dcaa82549fb9a282481bf55fa57a0941adfd9996f4846f5f2b45903eed792c5042d69181cf9925433e4991c18328f187d80b13d15c85901c424beb002d22744b00d0933749013e1e901c0cba9936b9d735a601d7517de4c50450a334487975882d18c51f2add3e7527afc29cae55ad573", 0xb9, 0x8}], 0x1000, &(0x7f0000002fc0)={[{}, {'}+'}, {'net/dev_snmp6\x00'}, {'uid>'}, {'+^)&'}, {'\\#'}], [{@smackfshat={'smackfshat', 0x3d, '}/@\x00'}}, {@pcr={'pcr', 0x3d, 0x20}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{-..+'}}, {@fowner_lt={'fowner<', 0xee00}}]}) execveat(r0, &(0x7f0000003040)='./file0\x00', &(0x7f0000003240)=[&(0x7f0000003080)='{*\x00', &(0x7f00000030c0)='*[+\x00', &(0x7f0000003100)='}/@\x00', &(0x7f0000003140)='uid>', &(0x7f0000003180)='\x00', &(0x7f00000031c0)='\x00', &(0x7f0000003200)='uid<'], &(0x7f0000003340)=[&(0x7f0000003280)=')\x00', &(0x7f00000032c0)='$,({\\$\x1bz*\v-/\x00', &(0x7f0000003300)='omfs\x00'], 0x1000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = geteuid() syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x8, &(0x7f0000001400)=[{&(0x7f0000000100)="fc498dccb100c9307105955aede85a3eec8c107fb585cbc5f49e7d0338e0b35df58408f9dadf", 0x26, 0x36ab}, {&(0x7f0000000140)="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", 0x1000, 0x800}, {&(0x7f0000001140)="a83e15576277a0c9637aa75ebc7e7e1a09069ee46d8fef2328a4296d82ed59a4fcc34abb0e138abc6b98f170dd63fdfd356544911402c89f93264457fec87885", 0x40, 0xead}, {&(0x7f0000001180)="60a28cbbc623c563285ce589bef3321fe306813c5f8fe5824dcd", 0x1a, 0x400}, {&(0x7f00000011c0)="020afd26147977e01b6085eb6fad0562229f8bc9d27b75074abb297340e38d4763eb89ab3ce3212971cbfdb30e9555d6bc8ef38b9dcedb1f22723cd5d889894e6806f587da805f626648b42f00193dcfabccca4ced", 0x55, 0xb27}, {&(0x7f0000001240)="c64e3910e659d4a32b45fe89fdd47be755", 0x11, 0x9}, {&(0x7f0000001280)="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", 0xfa, 0x869a}, {&(0x7f0000001380)="a6e0a79d7fad7375b58b98d40e2797c1439f2468951fbb232976f17cbde05e62fdbc3dd95fe3c0aea3f8a052ec92892c7143a3a29bda85140f7b41cc8b8f15efcfd03e83555025c1288c1886e8fe642e797b9d3eb00902ad724069c25bd377a38207d6a589ef213d7d29a44945eeebb77f04898211", 0x75, 0x2a}], 0x40000, &(0x7f00000014c0)={[{'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'net/dev_snmp6\x00'}, {'}+'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}], [{@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000003380)={0x10, 0x30, 0xfa00, {&(0x7f00000019c0), 0x0, {0xa, 0x4e24, 0x8, @local, 0x3a}}}, 0x38) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000280)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 05:45:41 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', &(0x7f0000001640)=[&(0x7f00000015c0)='}+', &(0x7f0000001600)='uid<'], &(0x7f0000001840)=[&(0x7f0000001680)='\x00', &(0x7f00000016c0)='0{,\x00', &(0x7f0000001700)='}/@\x00', &(0x7f0000001740)='uid<', &(0x7f0000001780)='omfs\x00', &(0x7f00000017c0)='/dev/vcsa#\x00', &(0x7f0000001800)='}+'], 0x1000) r0 = syz_mount_image$omfs(&(0x7f0000001880), &(0x7f00000018c0)='./file0\x00', 0xfffffffffffffff8, 0xa, &(0x7f0000002ec0)=[{&(0x7f0000001900)="880ba4430119a8ac120afbb7642b7238114391aaba474bfd704accee8c6f8aa796a388d958c5720f5f7b3b8be8a5292fae8046c2f8a6f5103872820af2dcacc0dee8b3a687ca148ce96bb7253c8cf3ee2120224564bb20e012014ad4da7b16cfed6b08b22edaa7ea982a24eb685e80936a7de07dd49dd069f48708954545882643a14ea930f434d04a6a502298a092a2e3d35d29de4c7fcd33ee26", 0x9b}, {&(0x7f00000019c0), 0x0, 0x8000}, {&(0x7f0000001a00)="dcf1b7aa3d93741f29c3e21a52f2002b77f44e4563734bc7", 0x18, 0x7}, {&(0x7f0000001a40)="2399aa9916903f67e3e3a5f31ff07ebc36bc8c6367a1af296ca7931df141dcaf6bd4a424ce300ac2c98682698f849d2d353ad227a760e64aa6ed79193476ecae47d9681ff46cbe0023f8d3a687a9ecae2f19669c86b05e45f96ecaff489746eed62e291d0b112079f336a80068723ccb9824093557537d1197baba34c6bd81351417ad5cce9fe228d342f97901517fce8932c91254a5e90068a3adb9f7548c52e123b126b369fa3639f8645d85700e380ae85567fd4a4c1f2f36631e326a6726fcda372bab301fca9d35bee31a34bf0923a01ba8d378e9c553cb6fece311ddb1ad47ae8b64", 0xe5, 0x2}, {&(0x7f0000001b40)="57858bcbd7ca3820b297409a5fd1f149cd0c27093ea980300177606f531fd26bf6c8e82396598aa4832d2a16b0ad92748d4a75d3017d3dc9e649b4128e2b982997786a5fde92a95945c2564e749fb7e2f9f2e0b7554091fc2d43ae3960b4060a7f2c20dad93ccb598df71c3ff52b50b104ca280109629a8d3c6b72393ee2ce72ab43ae", 0x83, 0x7}, {&(0x7f0000001c00)="f25632db98d53d9a7aa9900c416b3f151012a7dd5080bace3301e07e0517aa6aa907be7db0dee73d7b1bf92ce1932e80767f172212ac3457", 0x38, 0x5}, {&(0x7f0000001c40)="ef9fb322f4a2cddc803db54ae21e978523e14fa2747bcdaf7d2616d960785f6f5d421e87dcdfa986e9656ae5494cf38e5741e55f6bd7e773eeb5519f32bec3af928366df53d5b8bd5e36856033b66ff45c0b1bf5c12dc94ed1c7a2a9f872333188c547bce89597c0201526bc1df4e1c3dac71ccebcb99481f09d6c97f5a0346b6356e41158f5d1195b5a8fd89014f76f9b10ef00eac294c87bc41444d3b781b8864b72a721842732dfbcafcf05fd73e6646f1d368422d8d044d1f549e537c6eefef4dd1b9ba5e675ec64ed205e20da73e24169fd18fc611a3ecc1f17d7c6471392e776f75d4dcac99aef451fb027586d369fd66707e17684856ee667ca29454830b531d5c51091dcab7defba2d75b7ec49fbb1d39ce7d975dde9b0f2157a43a1ba7a35cdb40c3688e343e3980e748f0ccb2be200afb022a2ffeab6eab3d27fbda1ace6ce60d47a942ce609ddf113e175d645ed60168dce1c1be3a693993d9ec55b59566714f0642c6d043209d0f54d6a5c33f6668786cb56a43b4ae5c54195fc6cae3f05931085036ed3af4a49a3e8e3f7c893ebdcaa4b5571e1e65ab05a4c172132508a5fbbb3de9687ec1d837d37b1b9fdabe2fb41579328a7a5d3655f88176a929934e632b54c5e8e46c94a627590d548a8efa9c73e100d64ce4cfef1ca33b9a597b771b8b4431431acd76c18584441d695af581154d549c60f1ff9ecf2b1fa2dbc155d323227895096e7702cc3d2849b276a14a8df0388ef2ba4c0fc342a253c52e4af34bd1610579341fe57e682b7cb8ddcaa048cf1561745c316148c39777533a17e608f09df7b05af169566ad3d182bfdf07281afeca025a967b43fd1158967e102e36a4f5ad02e89b231c3c2a6abfbcbe3e19fe25383dd92812f64aaad7abad346300cb4bb0f209431b9d0ec3e510dabdd7b8373b8bf72e1080c527a665da7e7c09468a98cf64219111f4fa8233d2711b8290a85a53831e490b6aec07700ba9478920277a94e64c2c7462263de866056ed7ab4a5eaca263b6a7fcdd9e6ba5a01e57ae19a6a9c3d5f60f5606543a8a6817906802f082975808eeed0de8fb47eb6347f433391f995151d6cd2572018644138350376f87f997b1f371bc2c762b6c310fa1ecb68750f89c59b70176b8e396ae0104ffce22f6f6b08466b79692dc3ea2a75cd26e09c37f5eb6e81c3d94ddd3a82f4e51477c6e3cfd85cdd96626feef10e814e2c2cdb5a521f1ea189cdc65d03c9dc5948380ac24404f5d27e3ddb79afd719698325361cec07113b30d6907b6a8469d30c9f71f9d467b076719924206d80580fb059c29d64f5ea8129bf54bdbe758fb1838d338adb57b0e5aa027aa43c021c56778ad84201d9de210bf36e67411a44e8a6b3f4332a045c438f111e8cf466727e227999146fde5263c4a17aa536ac30d0527b51f7edb9ad0c82989432063d2de417b7f546f9fdc69f8adc3a9679f88b136cdb37ccfb74a5833ceaba4d4b73ed8261043f48e4dd95c7f10a70525f8a4e0b2b3037c10e7a8fce29bd0346ab239554632d8f06dc83608aac4ffedc1bfb7e4a17edf0bb30e2de207cf195633a6cb41c6f650eae54fc9c2e62328ada0299ee85d71c57801b4f5448c7c61faa0c3886f269a0cc4cc19bea77894acab724b4640ac09a6bfa3300934bb3a60931f9cb1372b387a4211069cd5eb489c52210df0107fc507e6c041935bb96b22636c0a1dfde0b54bbbc3c0c1a728b56fe45881ea1fea9fb686ac4303e89cf86ae41ae7126f9a4b5d38865e3d44981e11fca696feae637e2eb7a1d7b31ccc921496166cb15d95c49bd6a080d085530bfc0a6eb2f48b38a50e8d9d7b0ac86178b96cf0f0bfa03bcba3ffa9441970962c34b113bc528926c2c2b7ab264ab6eadab647237da6ce875c76d962204dbf512d26384c0b1a4c45d8ca31095ca533f1a60cdb5109b3eb2dc108306d99cb436419555d79b6f702b15efff8ace8b185ff6c4e84deafdb7b9ee4c2ce045b6bf6bb456ff8a8b1d8782d5990f3754070663e1b60db4e199828beb5cd161e5a1825724018344b4eeb128ea796a74f96c4664c12377b630922e2e33d7abd08b23babe895d0f2aff9cfb2817151600c031df98b067cfad1da1882424df175571d56c6f605f0118c61744329816afa7ef165945e2a5018c4ac17f9a40fa7f507007fd5a8b1edf07d7f57c996690d399c1b8f2b357aa64fca90785c03e6292e9b3b6d2b77985f2d8e954f4a1b6b0ee69fef084271b814f3f78ae444a0b06419a5905c7700f27519b1e67aabe64c6bf5a50cf105d8da7056ac2ed96bb7c52d39d0d5c6add1b55f746ae9baeaa8d14dc7e7a7e20f120fbe2a04a89f2d12f5437e46863520a69661748d83908e3ea250d3a5bd585e928b79cabad2071ebb065a0ecbab492b2b3df9329af60e49978db180243c3c2fe48ba64bdb0690a208ef928bf71969ba9964bfd7a4f1e18054a8a57c720df6c8284a9081c63868f64c8e462d89baba969e27a1ff36282ac48bf90d94a5605201f156a90fbe4da8af7ba3d37c010bd740dcfa8c7126c4cc87bebbe668369a5c3940db254a0a9b7d487ed224d10a6db2b7d0955f0ec1a4a062ebba6cd571af23fa23e28c7a149104d99578939544cd23a06083a4bb9af62947b2cf7805e168ad191925989b766344107082231c7675825411c4e4ef0990aa1200b642cab4dbae28168b2240652a89e6a65cd0e70c0128883b46b0d1d66721b5efe5bcfea4814d1ffb6ced84e2244227eaa57bb303e36ca97bb8c3c5c5d51e5cf78537535b60ef4ac138095a4c4ee13c1a9fce1f19ef7fa03949e91002d21941f108d83f64a89f5916d7f98e87807d80752766b9d7ddf4b20d884339339eb0864fdd81bb6dfa20e8a20f02e018de40d97a591f1bfecd85d452098ae45e99502747125b2312c57223530475ef8a59b7afc53978ff2a624634cf11cdd533da4dfec9d03220e428574dbe5d9030e8da26f2b0ed3fc3e2c8761a00140418db88e43e6af0731296aa6181dab0ac7967b2efdd476ab48f06613e45daf726061ade2cda897dcbbf3805a0c7deb804af7f81fcadf839e4ee06120725c065b8a0e5a474a551b53370d614539a30404ab85ccaabd27643ff528f01084e127076af7b6cd03864569b20bff4f94583fc1f6fe4af30d61214cf0839220ec10020ac743407299a0d6867a5c70bfe91aff763fdc8920f2c4744771ec599c935ff885c7702181eac32c60b0c77203c974d8742fe1b4abd6b8ca9ec4d66b7255c16ab419de61727d8672be933483afd7a5ff85565faef4b6906e99e423c7c700b9812ec2ae17bea1c486ab5eafd212a6e8f5fa3941d9cc09a7d0ffdcbeb9ebef575604cd659039eb2fbbe71e52444da6770a923b25674286fe24e6c742e7dfb3e8c5731c33e244a9e993dc2fb19629a8f20f03120a18826abacae5ec61cfacd816d2db6c6542ff4e868650f568d2a1c2b085cdfcd41fa8e0a1de55a784e09c4b42dd50be5ae76026ea1fe59e0bb2c1a1163ab0bfd02bf7d40ba977311a642490b0a68eb19008eb1418c54df83e3d75a255c226111aecdfddfe6ee4f73a6ef9429e850c94a54fa57ef01f4332b9002b9c492dd0d3e9b543ff951be790effe3c9b840014d08c33997a4f0c3fd47be45f1f6842ff58ddcd7434278354b0312c7db26b44918584804214c61ef18f2eacbc596e3919163ab6efc5f33af248dc8f1d337e6c298d722ce231077fecb6bb60c7760f4785055a4a9ed191c0ada70a2aa192c710b8d725bb6ab7f723d617f3990a15e430246bc2cf5c40fc8023ced6d6f976990eed5750aff76e07beedf32ee74387bdefd6e9fa08b22b5c5a828f21ef3441c4f0c65bb562628f8fa8107e122af9b9f64ca5e63988e5359c9667d6041f971e51899b116cb3f89f6ce7646ab27471a17c31f185aaafd3cb97b6142d595eb0d1a8b04d356c613634f852a5f1597fa89c46a3309160500ccde330146c22c9840dc35197c88ab6b8ca45ffcdf38f3e9295da45f7121b8040fb9b9bfcc2669cd06f21720a42985066150aadfdb021f11597b1e2836d0fa47306880e8fdde9cb401c51f3008a37bba0b2f153ebb9badf58910bf29c0a421e039bfba544c2212eb689e0c3616367cdc725444f53e12aba0247924c6618861972fb259107f9dfbb9ac39612f2d283807021c6a8dfd3a0e87ce26c93482e301db89f3e079aacac1ad79bddc1bc3c7a34f3e1e74478d4d46f96ac4b572cebc3f8e960b3766f5266f1dde17f6a69d8c97d32cec979c5196c2dc7892e549ba62aee1eb36a51d4c6395e4c8774589d56c7a9fe5a52e8ab7c00fb21605676ad21541442d7134efa29d2f5cbeb7a96618b79c177f6ecc9ce201fe46b9b47741068f3818bc473bc31e858b4cf423b68f7871b069458c0e9933b00db3e25324884242f772d6484efa4381f1a33b41dbe7728bcb4236326cc4149dd1567894922c7ea3f7bbb36ced9e3dbb7f77add921fc3293ddc9852a73b79bfa6814d1ecbe01c3e30dc01eea89800850ea76c6d8c24d2eb98c82d3919172136a69c1409fcaf282c887245635cb9f0bc62be1bfb4f9521ba5a134ec01f2abd560d7490e6e362c71786190585a194eb83ff75025ebc042e52a72dafe184898e63ec7007c111a3d62ba826bd2f4fec489bef66a461981baceb55225d2571574503ae7de50a774b42975e79d45ab4d577cd6c353ce5511dd26384b7a3d28023cc0c54cbafc1371f7d9a135ef6148d54a0d240b702bc24e3867d1cec20f8acd827e35dc9554b732ceea137efd22c0fd516ed99b0ade7d6807ef08665ab26b72ae0feb8c7b779574e4fd879c98106943b39641362222adbe1ea52a1f84601359bcd73194a8d55238932deaa7dd734eea4fee05b77f06f91d523b48e97f20b9ca6492176243e1e500f91e18f0bcfb648a8f40a01e6b866fdfd3a60e8292537b74872ab9cbb4f27edeba063d85daf4a6563ecde84c3fd71aa44c62fe44e3e49d4f476153d01bd94ab231cb56c1a28d5728c826e1e87339dd3037559ab184884d72ebfe9846c4810f4e049dd080ec19b2d0b03f11d8518c3cc3487bccb525bbb9f2daa4b3d03e1883c7e09955b6e185648ef7532fe31ac2e2ca1f84717452cc08d526e0d0007403111c089b06c3a9f8b49809f6041aa50caa31183b64b354a2414ba5217e8ba11045d84a1d305c83dbe74b154b2f383b23110b8d9c999f0c06ed0625b58487efe6a9feb4addd32cbdbabe66842527e88dc8be1a114ee53ed6981e82dfffbb999d23b815fa522cbcfb76fa41de683ba9d85bdcc7384e96b26ff58389f1d22068700288c5e779dba35ff3109b232aa21698e146b115de4071b05686df23935fd2e1c851c783f70be63ce6e2d47a84bdaa6f4ab87d0eb47d9a5342ec93c2290a3390304dfc30fecbf17ca43dc7ea22a7a06798a6169ba4f057cee1c6ea621165ae6cfb26934b0ed5d0d7fc508bb0a9c13f619d8c6bd0b0c20a4f9de0d75262a205f3bed102cda06ed4747bacd5ee5e73a468d94cbdacded2c96011e28f844ddd27b4c815e5a9e1302090fef98c88be4c259f632130e7268ba89abde241bda87ea245ea518e52ec2790054dc370349b0f4b3b224d256966caf4246992e54ae1ee7d3401f5acbc483db76be56d347079af698173a3360680b7d8e2b2a1db3f9630f2232faa2ca0b21717b90331bced053542934be47217887222a4958fdd0e3c752f6cbb6b7990bf5c17a69ffb84bf7e0b5042739e747c128efdf2d98c2bf6f0a8fbc8bf594a", 0x1000}, {&(0x7f0000002c40)="eae19ec30fc3998e2d875c1828f12834ecb07287def7c75583477a74029fa23445b3c9e6d4621f1740edc2305c141aacf1c6a1eeab7fd40cc0a8203dcaebdfc229634571e9d6a2c7c2475b79b9b6584baa6cbe73cabcb45dba969ab5ed94648d1de680a2d2f6eb80fc9da274338bdc302ca3d7c5c22daddce22ac54394a3ffe3ad5774bcda2ad0718c4ad66932545092a0317e34a3507c4ce2d7d5", 0x9b}, {&(0x7f0000002d00)="31468b8b3f48d7127862077e87dc7fa0bf4c5833c16ddef8450a0b48f4965764f58e3219e32434e783f539a2d7868a658c14368333ad32372e50ebb42fdc62fc1303362502f82ad67cc775fe33afc421db837b18a874fb8998c6a8ce8a74ed1a6b93319a8157a5879299f5502f43d325dcb4be2c7fc52153140038bb88e539cf10db159d77d90e079925bae6b2f62913684729b9b62b71dec3e4ce1799fafc816c4a5e981ac98c8ace5d9ed71e2dcc55eb8c4fa47907efc3f246276a365a9613958f661332545a74553a8b0cbb752b787ff7e5503ef1111447ac77450b882cbbdc4d990423ca3947b3db", 0xea, 0x7fffffffffffffff}, {&(0x7f0000002e00)="17c2cde9a27359ea443ea7cffd688f8ff1d80c2ac80a8fb5a89e007b62fd6e7e23b33f075dbdbb5a92270f86d60b287e987ed3258f0fe06c95b4e3b17998219d0cd55fcd75c33a701dcaa82549fb9a282481bf55fa57a0941adfd9996f4846f5f2b45903eed792c5042d69181cf9925433e4991c18328f187d80b13d15c85901c424beb002d22744b00d0933749013e1e901c0cba9936b9d735a601d7517de4c50450a334487975882d18c51f2add3e7527afc29cae55ad573", 0xb9, 0x8}], 0x1000, &(0x7f0000002fc0)={[{}, {'}+'}, {'net/dev_snmp6\x00'}, {'uid>'}, {'+^)&'}, {'\\#'}], [{@smackfshat={'smackfshat', 0x3d, '}/@\x00'}}, {@pcr={'pcr', 0x3d, 0x20}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{-..+'}}, {@fowner_lt={'fowner<', 0xee00}}]}) execveat(r0, &(0x7f0000003040)='./file0\x00', &(0x7f0000003240)=[&(0x7f0000003080)='{*\x00', &(0x7f00000030c0)='*[+\x00', &(0x7f0000003100)='}/@\x00', &(0x7f0000003140)='uid>', &(0x7f0000003180)='\x00', &(0x7f00000031c0)='\x00', &(0x7f0000003200)='uid<'], &(0x7f0000003340)=[&(0x7f0000003280)=')\x00', &(0x7f00000032c0)='$,({\\$\x1bz*\v-/\x00', &(0x7f0000003300)='omfs\x00'], 0x1000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = geteuid() syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x8, &(0x7f0000001400)=[{&(0x7f0000000100)="fc498dccb100c9307105955aede85a3eec8c107fb585cbc5f49e7d0338e0b35df58408f9dadf", 0x26, 0x36ab}, {&(0x7f0000000140)="ae03953cbdca582146966d5d31fefb8499d84c22d2f5c1dacd1c63baf822920919423446e07e87bfce16d4b47d7f998358d80759ee2336aaef3976957e353db87d1131d09d9269fd03f6a0bf230b6236e2bddc5745705c90dfa9b47d21dcacb2aa0b7594918f3ec8094b7feddaafdf25caba79c95a04cf8fb6b6604c3fa46b9dcf83b09e64b3e188bfa09a3f6e846ae35ca703b5f71c3769ff8c3a375a0b436a919850cb3ec71c22e52ae272d05a2b4b2e797ba2005eb3bc24d14217b93242380f5922d02f89cadf71241aaffbb9e0cef6959f31cbaa1db581e91c6709af75b3625c2d850fabdd2c1c0ac0557e618a8204dc9a48044a9c66a1b5d0798a5f4aa18ee08af4e51fc3f597a282b45a06510f10d9af2b576111c477de3746f124587cfea5a2c28ef25dfa8d8ce42d2cc324438de01279e52c052e272ed5a6c8bef5f48499ba567d54e5318e8d196851563a11670be065df09858a7d75b4346246e415023bfdb7d87de81bbbdf8cd2e48258ef6e485a151ddc6dc87a91a1ef6306974fe6af55af7b0d3d4fdb5cd95c716007f39f26cd1a3228431a10373a4de65e089da2a9d7cb66160946a6212eefa4e537d023320020b0e47ed1dd3b586ec518a5dc85ed0d0094593d5f57f1205c7f10acde2b2fe83b2a849f47f763bea4ed26edc7d4eb7a1b68714f49d0bfd245dc38d7b5cf7f3afc9c3ce514e8b32a4a922309fb03f646164706af8cd4673fa000641d58616e1b372db1cccce1d7dbbabba34b24d08d6f546aa9fe1984674a1cd71821a20aca57a38bbf636390e87acd886bafb0540c969844ab20a3ac2a66b65925b37afd7d739962e38322ad727a2acb3d26e815fd489e2f372bcc20ebd2e5325ecb7eee4f5ed0ad9a58b5381e9a85f4768c7231a28f3b93a59c3bdf4f461f6efc8aef27ed0944d2b1b82d8852f15891ae188404d0f66bad9c254611b1f75d584995eb5b7e001c3cc2a7e8f05a9f50cb5197e1db99c692b0eead881c5d29331ea43d6f97ffb6680464e9f416b73d6001ebae7c62dccd4dee0b0c5fe791a22c2958094a6fd7a071379fdb4ed50af62c511fa2694e1f4a78c4b95fca3ecb26faa4bd6f37757f994675fac3d35e177ef9d3439d2cb1833e4ac1f7903df0fc86d6749c7241b970be3afe875f7f02a0cf54cb4ccc83fe3750674e69eb806e513ef82e12eeb48cef559be3e112c1587da3f115a3c7425b887258b926d81bc52f26d5311d4c37c2c529a0ff40fba3aa5732c30a8adaca239111ecc20b94e6421d4cc64818ba1952441b756798d3c36ab4f50edd64f10e88e2438798b7e246bba2ba43aecbc08090e535d5753326a3bbc5e559a43d5f97265936d99a24de63c77d2d83d32440052a35aee46e1db72819be4c8d3ab6f3231fecae317642b3c550f013aec008df4ea22ff6007531261d9722df898b31f6abf446a3068841e6817004fa9b1188efc69b4e40fb5d428a3d06973aeb134a9af424837f2da0b25a1ac57e73fe0a7f21c85c9abf69ce613e87a0afa074fc6263472d338b27ac4ed02f3fd5e6ab8ca3019b033934eda3337dd434989bd01b380ef1aad3069ca2926ee728981da45633fc28b076bf9f0986f2baf2a0eae2797c411cc53119944afd5a800af57409db2b2de4947b349dac266e25cebdebd432f7c90e26e9dc6020873b7fedd16a4e3490deef8cfc7ba66a1cda8fb935cc8680d5b4d67ed983650ca0ff478e8dab18b770bb4de78529e473f3da1781610221f95f9672a8b97142890b5996775fddbb89c4a61b10293180e32e703c174248a55dd98ce41f989ba49c9a7837cf8e7f38d2201d512af563dfc93029d6dc0f54c6eca96acb5f61e0f0e90bcba79a2fcb598f50ba32f4dbec84918aa670d202de74e9b8fb83a42ae8ad74dbc0261943dcc9cc06acd21ecda5c3c7879da53a350237cb2f0c4fba4eb2f8a603fdbca05a93408e8a70847043197b976566ccfea791f0e8f360adacefc0809699c3e3b678765e7eebbefb8d846c181ba97d5c21d94a4055a7ae2b1ce5e2820698a6dc760cb519e620ac55fe7b85bf42334994fc91c280f2fcd33a77fe5435cc43379fbfe00bfda3cd0c779ba87983a60844aa9fc151b5a3913adfdff871ecef08d91d34cd284a3ab378e9b6c42fd8db5dcec34b6c6eba207bd22ffd54b0c938c6752bded186f6711d591dc9546d10d8c33e33fcb4e7247531b844ab61cefe04a793f153099227ea2daf95010e464f0ea133e466e7bc05108374da1fa30c62c7454ff760e6b09e7cc8069eb39b2b5ddf9bf85748f8cc67fbc2b2a019c2d42e04ad090da935d114c0bbf5a79dfb49103b31400454db45a68a287f9508ef71ba2ef2802b4b71a59c7009bcbc486c588fe1d521649356ed73c0e132eb2e18ab1866ecd9bc320785d6e35743b26550d286b6846cda7411ddd152f411562804182752b01a712c1a3618b3ee2584b0379d5ebbbffd293fa9c2847ae5ead1a8b43cc38000884f9f13cb2de1d076ce5a13961e125d2da7da1fa15a4203c29fd293254f5f16dcbc94b5bba34bff6b5e2b79fa1be612562f61aa5707cc25f3d8f64cba7ab1d70accc1a8cd9e94317f9fc9d44542f1debe1553552a8c87809f574e7250cf5a6838aa4443a246c9b69f85035024f0913781663aa98b0d7809ad25364f40c8f857d2c7e5c8319f871814dc957ca19d5f2d84e51cfefbbebd2a8755097deb331b06d8db331f35d5f6445a7470f4740344d562532d2ae68f546c8d61e7301acd6aa2fb3aa86f20b9796cb451b9d4db72a0049214f2343f5106f0a6fd001748788ab4410d3507516b5cc278829a427fb08db87c1819be0b1e0c149cd27470b833f77fa3b4a2b608407038e0775514cd586dfe5da928e95420d590fc93b43d969cb6b93aa3b49039877bee59c01b58536783a8abd94e5736ae9f1f39e25c80afc75f1db1150f6da8fbd4d89c8f806fd06083f682a98e125e7030ce105f983bc0344acafbf3e27ca0653f0069561c7d4a2b2d282c8317b3fec2c29ce69dd9b4195cb607635f37c0a0fd2bd226767aa460188b368bcf7ccceca7d1405cbf3d637aa644f31fd7eeaf25e6eb6dbf88634fcdfad44eeb3ec2f02445596b1e79177d573b4993ccc33adec963585a0a41fd128efa6863f9433375d61b7c2b0dce138d03e01fa9113b49c449ff0dfb9744f8492784aacab895e97baddc94dc5780720cfcada20ee3c88abf5b7c28c8d1e53ecd009a0919e3360b9029c822a3240f90012d344446ba8fb1aec03877184261e386c34c202394aeb591628c7c8d4582c4337fa5179d1ad8f48570ea9dc4a4e91af9df6a875d47f1bfd1f122e0beaa4543bd3350600b4521bd59403f41a69d6b722e59d3917771d61383d7e268019f3cea41cdaa4209e5c139d3564ac12dfa1217d4d0ff6e0c36c50a8fc76c221faa1cc3341f12f096034c77496b81d851df259483a56b840308722d193bac668bc50efbb41f27620cf92f826536eefcf9f022c93b6de972caf9076cc6ec416c058041913dda86523b2adf0c64145e349108a24ab52a630ea38e2e3a4482072a9451a0c2e47d438a82a5ecb51e51a420ee50c775e6104082056111f2714eafe9b629b815589a6a3c05538ba62b4aa335d6f4dde46c73cd38d65aadc4f000c6281e1642792cff4d006230c9b606fdbe4ef50fe0c443e40d5e94b6349700a37cfe3a97185ad22dd6e92b11eaa7c812625bc13500591115a04fbdb56e0b117a15cf3d3a52a809ca0f8ccc1b26664d0b52d1c1c1ba943da85153eee333186f81f56afa105792c69c2f1d20224532b28b9c45bfae2b8c9394a2087240925fd6ba9b50e9b0786155b7f03680f7eaeece7e7aacd0e2e18c45e04c508e9011e28128f88ae296c9d7e39723f0d62931c80cc31713937cfae6f15666bddd0aa7abf80be69e91514606c55b6f562d7b7cdd602a6d74e91db5f08fdf519275c168dcda63aa0f3f686744cd2159d44fc99befbbd4a70af3f826cba35203cd364987007c47c6cf42a4086ae74c93764a12a4710def0dc2c0620f8ca1b0a918b9f7194564e2919aa67681ecc1f1871b425c40f3f27ccc44cf1fd5e55a6c37f0cd621c7ad191340580d0c601864559e70a4d661ccc4af22e119f1dd86c56eb32217ad0b8c9d988df164386ee14e3c0ee6ec6d8b8885a1fba0ee42a517130238c6412e21724d56c5aef05f2e8c0e4f5ad4d94fdeb9f15fc42ee5423a6ba284968a7570a6ec5b1e77c4c0dcc225af02356354fc9e439ccea2685f4ad9ea7e3062f269b33c19079e636bdb03f2f050346fcc12a81f1177ae4377db6e6c9ac31e0725e9fa995190d91f939f8186a0fb6415e8ba544cd12c860a3006132a3b2b69423cd573562dbfc41ad8a358964a52aa43ef81555ec15da7b58d7e5efbe954a5a3704784ce8f31419a1146124f309e43b2cbea5ad3796090380eb6deb67fc02748c7d534eb242a165826e88342e80c4a93c43580847c474c60bfa5db53274547e3041b711561c9373104454194ad8b9574e63ea31d7b587277deff608cad2214154a4a25dd85c04585951263efd7f481a4f9e4fb9aa2986312d90f05e03fe6033b363bb9f0f65b5e5397d40fd2d71c9b51583cebe577a1882a83e06a209cbab43113a696839662e36e436dc87733ad70127526bcee64c2cbea5e4e93cd2c4a70bb83d538957acb3cbcee8f6173c819c676169498e771494b962dc1b855e4a5c06d0ef9d88c6f50b53423ac938153bd5a66a4dff1f4225f30fd429851b7aba0ce88248a0c14ef8fb780caa1eebb51904a187b28156ac13618903bfc951b3d35b76b0ee2681879b411942e853b2b98955d6c45519430a86eaac597b9453d8818492df86ca59848f8b4309b003c89c7f08cac842e5291f462a55337254e1bafb81d210467d3095ba4622cef370e3c9bc593d83b1e5954f5529492878270c986ab638e7b1bac98a3b5d8cb1fe56f1e54857473e00c9d86c5a57e4f7d99a1969835dfcd6905486873102f899ecc4f5b6ed8b9ab1d71222f09385e944c9612df9a45d6366393482f2bbb886aeaad6d2fcb7b955594d3b3f296da8f6b9220c9cd265ca050fb874b85428fb10066fa83ddf4e6db23c20b882c192df32d837e767dff94105cd0581c0afbb0b29cd8468b4217e0008a9acca91d8c9dc33f6c390e898e6fa7700275c176fb9a55bc2fbd733616a14ba025632f4944ffbe519a31af6656f1d79a41b8b7b1f06c797368e04f9f90326c38bf4dbb66e5f0be31beea0c15de7d93fcf418fce1d345fcc69959748ea9f36ad90b6f3b5c69fbdc70e3cdfd8e0cb30e6bad60097d8f1baabb7b1ad558c5d13f37c40b9028dff0269870fb3896639c78889f51220f5ffcd68284bf2e5f123daab60c1c12c3b0e5980e790f58fc8d82edf3f5435eb7ff4ecdf3b6b075fad41bfac02b5f3deab79ede6179e09dad05deb6cb914ec4aa5df52e173fa20390d9c1ae089dd76cb326caba44f0c11b2088b927feca688f1e8f0c8c468b4be5ba2b6fa695738d3670ddc7ab10eb7c13b79c98ab946fd36223d8c94aa1becdbcd69344e5be049b6d42b03730737dd81367dbd70e5a9a0def9eaa0a33e1fe2dc30313a1687c6a33bcda012169cc0bcaa7fb305eba80c2bb529ae6ad7188e39da55db618961f250973be27fbd638b33e64a1b4616e79cb7377a5008b8ffaf61ef986135a1f53bd31a0a1ec29d14264c0586d711f0f279479a3e9118430b198ad750086e048fca6e1f31661f5400db7d2dade072f5ebf1ddf257e6823127745873bf", 0x1000, 0x800}, {&(0x7f0000001140)="a83e15576277a0c9637aa75ebc7e7e1a09069ee46d8fef2328a4296d82ed59a4fcc34abb0e138abc6b98f170dd63fdfd356544911402c89f93264457fec87885", 0x40, 0xead}, {&(0x7f0000001180)="60a28cbbc623c563285ce589bef3321fe306813c5f8fe5824dcd", 0x1a, 0x400}, {&(0x7f00000011c0)="020afd26147977e01b6085eb6fad0562229f8bc9d27b75074abb297340e38d4763eb89ab3ce3212971cbfdb30e9555d6bc8ef38b9dcedb1f22723cd5d889894e6806f587da805f626648b42f00193dcfabccca4ced", 0x55, 0xb27}, {&(0x7f0000001240)="c64e3910e659d4a32b45fe89fdd47be755", 0x11, 0x9}, {&(0x7f0000001280)="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", 0xfa, 0x869a}, {&(0x7f0000001380)="a6e0a79d7fad7375b58b98d40e2797c1439f2468951fbb232976f17cbde05e62fdbc3dd95fe3c0aea3f8a052ec92892c7143a3a29bda85140f7b41cc8b8f15efcfd03e83555025c1288c1886e8fe642e797b9d3eb00902ad724069c25bd377a38207d6a589ef213d7d29a44945eeebb77f04898211", 0x75, 0x2a}], 0x40000, &(0x7f00000014c0)={[{'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'net/dev_snmp6\x00'}, {'}+'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}], [{@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000003380)={0x10, 0x30, 0xfa00, {&(0x7f00000019c0), 0x0, {0xa, 0x4e24, 0x8, @local, 0x3a}}}, 0x38) execveat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', &(0x7f0000001640)=[&(0x7f00000015c0)='}+', &(0x7f0000001600)='uid<'], &(0x7f0000001840)=[&(0x7f0000001680)='\x00', &(0x7f00000016c0)='0{,\x00', &(0x7f0000001700)='}/@\x00', &(0x7f0000001740)='uid<', &(0x7f0000001780)='omfs\x00', &(0x7f00000017c0)='/dev/vcsa#\x00', &(0x7f0000001800)='}+'], 0x1000) (async) syz_mount_image$omfs(&(0x7f0000001880), &(0x7f00000018c0)='./file0\x00', 0xfffffffffffffff8, 0xa, &(0x7f0000002ec0)=[{&(0x7f0000001900)="880ba4430119a8ac120afbb7642b7238114391aaba474bfd704accee8c6f8aa796a388d958c5720f5f7b3b8be8a5292fae8046c2f8a6f5103872820af2dcacc0dee8b3a687ca148ce96bb7253c8cf3ee2120224564bb20e012014ad4da7b16cfed6b08b22edaa7ea982a24eb685e80936a7de07dd49dd069f48708954545882643a14ea930f434d04a6a502298a092a2e3d35d29de4c7fcd33ee26", 0x9b}, {&(0x7f00000019c0), 0x0, 0x8000}, {&(0x7f0000001a00)="dcf1b7aa3d93741f29c3e21a52f2002b77f44e4563734bc7", 0x18, 0x7}, {&(0x7f0000001a40)="2399aa9916903f67e3e3a5f31ff07ebc36bc8c6367a1af296ca7931df141dcaf6bd4a424ce300ac2c98682698f849d2d353ad227a760e64aa6ed79193476ecae47d9681ff46cbe0023f8d3a687a9ecae2f19669c86b05e45f96ecaff489746eed62e291d0b112079f336a80068723ccb9824093557537d1197baba34c6bd81351417ad5cce9fe228d342f97901517fce8932c91254a5e90068a3adb9f7548c52e123b126b369fa3639f8645d85700e380ae85567fd4a4c1f2f36631e326a6726fcda372bab301fca9d35bee31a34bf0923a01ba8d378e9c553cb6fece311ddb1ad47ae8b64", 0xe5, 0x2}, {&(0x7f0000001b40)="57858bcbd7ca3820b297409a5fd1f149cd0c27093ea980300177606f531fd26bf6c8e82396598aa4832d2a16b0ad92748d4a75d3017d3dc9e649b4128e2b982997786a5fde92a95945c2564e749fb7e2f9f2e0b7554091fc2d43ae3960b4060a7f2c20dad93ccb598df71c3ff52b50b104ca280109629a8d3c6b72393ee2ce72ab43ae", 0x83, 0x7}, {&(0x7f0000001c00)="f25632db98d53d9a7aa9900c416b3f151012a7dd5080bace3301e07e0517aa6aa907be7db0dee73d7b1bf92ce1932e80767f172212ac3457", 0x38, 0x5}, {&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="eae19ec30fc3998e2d875c1828f12834ecb07287def7c75583477a74029fa23445b3c9e6d4621f1740edc2305c141aacf1c6a1eeab7fd40cc0a8203dcaebdfc229634571e9d6a2c7c2475b79b9b6584baa6cbe73cabcb45dba969ab5ed94648d1de680a2d2f6eb80fc9da274338bdc302ca3d7c5c22daddce22ac54394a3ffe3ad5774bcda2ad0718c4ad66932545092a0317e34a3507c4ce2d7d5", 0x9b}, {&(0x7f0000002d00)="31468b8b3f48d7127862077e87dc7fa0bf4c5833c16ddef8450a0b48f4965764f58e3219e32434e783f539a2d7868a658c14368333ad32372e50ebb42fdc62fc1303362502f82ad67cc775fe33afc421db837b18a874fb8998c6a8ce8a74ed1a6b93319a8157a5879299f5502f43d325dcb4be2c7fc52153140038bb88e539cf10db159d77d90e079925bae6b2f62913684729b9b62b71dec3e4ce1799fafc816c4a5e981ac98c8ace5d9ed71e2dcc55eb8c4fa47907efc3f246276a365a9613958f661332545a74553a8b0cbb752b787ff7e5503ef1111447ac77450b882cbbdc4d990423ca3947b3db", 0xea, 0x7fffffffffffffff}, {&(0x7f0000002e00)="17c2cde9a27359ea443ea7cffd688f8ff1d80c2ac80a8fb5a89e007b62fd6e7e23b33f075dbdbb5a92270f86d60b287e987ed3258f0fe06c95b4e3b17998219d0cd55fcd75c33a701dcaa82549fb9a282481bf55fa57a0941adfd9996f4846f5f2b45903eed792c5042d69181cf9925433e4991c18328f187d80b13d15c85901c424beb002d22744b00d0933749013e1e901c0cba9936b9d735a601d7517de4c50450a334487975882d18c51f2add3e7527afc29cae55ad573", 0xb9, 0x8}], 0x1000, &(0x7f0000002fc0)={[{}, {'}+'}, {'net/dev_snmp6\x00'}, {'uid>'}, {'+^)&'}, {'\\#'}], [{@smackfshat={'smackfshat', 0x3d, '}/@\x00'}}, {@pcr={'pcr', 0x3d, 0x20}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{-..+'}}, {@fowner_lt={'fowner<', 0xee00}}]}) (async) execveat(r0, &(0x7f0000003040)='./file0\x00', &(0x7f0000003240)=[&(0x7f0000003080)='{*\x00', &(0x7f00000030c0)='*[+\x00', &(0x7f0000003100)='}/@\x00', &(0x7f0000003140)='uid>', &(0x7f0000003180)='\x00', &(0x7f00000031c0)='\x00', &(0x7f0000003200)='uid<'], &(0x7f0000003340)=[&(0x7f0000003280)=')\x00', &(0x7f00000032c0)='$,({\\$\x1bz*\v-/\x00', &(0x7f0000003300)='omfs\x00'], 0x1000) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) geteuid() (async) syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x8, &(0x7f0000001400)=[{&(0x7f0000000100)="fc498dccb100c9307105955aede85a3eec8c107fb585cbc5f49e7d0338e0b35df58408f9dadf", 0x26, 0x36ab}, {&(0x7f0000000140)="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", 0x1000, 0x800}, {&(0x7f0000001140)="a83e15576277a0c9637aa75ebc7e7e1a09069ee46d8fef2328a4296d82ed59a4fcc34abb0e138abc6b98f170dd63fdfd356544911402c89f93264457fec87885", 0x40, 0xead}, {&(0x7f0000001180)="60a28cbbc623c563285ce589bef3321fe306813c5f8fe5824dcd", 0x1a, 0x400}, {&(0x7f00000011c0)="020afd26147977e01b6085eb6fad0562229f8bc9d27b75074abb297340e38d4763eb89ab3ce3212971cbfdb30e9555d6bc8ef38b9dcedb1f22723cd5d889894e6806f587da805f626648b42f00193dcfabccca4ced", 0x55, 0xb27}, {&(0x7f0000001240)="c64e3910e659d4a32b45fe89fdd47be755", 0x11, 0x9}, {&(0x7f0000001280)="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", 0xfa, 0x869a}, {&(0x7f0000001380)="a6e0a79d7fad7375b58b98d40e2797c1439f2468951fbb232976f17cbde05e62fdbc3dd95fe3c0aea3f8a052ec92892c7143a3a29bda85140f7b41cc8b8f15efcfd03e83555025c1288c1886e8fe642e797b9d3eb00902ad724069c25bd377a38207d6a589ef213d7d29a44945eeebb77f04898211", 0x75, 0x2a}], 0x40000, &(0x7f00000014c0)={[{'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'net/dev_snmp6\x00'}, {'}+'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}], [{@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000003380)={0x10, 0x30, 0xfa00, {&(0x7f00000019c0), 0x0, {0xa, 0x4e24, 0x8, @local, 0x3a}}}, 0x38) (async) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x1d, 0xf6, 0x1}, 0x20) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 05:45:41 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', &(0x7f0000001640)=[&(0x7f00000015c0)='}+', &(0x7f0000001600)='uid<'], &(0x7f0000001840)=[&(0x7f0000001680)='\x00', &(0x7f00000016c0)='0{,\x00', &(0x7f0000001700)='}/@\x00', &(0x7f0000001740)='uid<', &(0x7f0000001780)='omfs\x00', &(0x7f00000017c0)='/dev/vcsa#\x00', &(0x7f0000001800)='}+'], 0x1000) r0 = syz_mount_image$omfs(&(0x7f0000001880), &(0x7f00000018c0)='./file0\x00', 0xfffffffffffffff8, 0xa, &(0x7f0000002ec0)=[{&(0x7f0000001900)="880ba4430119a8ac120afbb7642b7238114391aaba474bfd704accee8c6f8aa796a388d958c5720f5f7b3b8be8a5292fae8046c2f8a6f5103872820af2dcacc0dee8b3a687ca148ce96bb7253c8cf3ee2120224564bb20e012014ad4da7b16cfed6b08b22edaa7ea982a24eb685e80936a7de07dd49dd069f48708954545882643a14ea930f434d04a6a502298a092a2e3d35d29de4c7fcd33ee26", 0x9b}, {&(0x7f00000019c0), 0x0, 0x8000}, {&(0x7f0000001a00)="dcf1b7aa3d93741f29c3e21a52f2002b77f44e4563734bc7", 0x18, 0x7}, {&(0x7f0000001a40)="2399aa9916903f67e3e3a5f31ff07ebc36bc8c6367a1af296ca7931df141dcaf6bd4a424ce300ac2c98682698f849d2d353ad227a760e64aa6ed79193476ecae47d9681ff46cbe0023f8d3a687a9ecae2f19669c86b05e45f96ecaff489746eed62e291d0b112079f336a80068723ccb9824093557537d1197baba34c6bd81351417ad5cce9fe228d342f97901517fce8932c91254a5e90068a3adb9f7548c52e123b126b369fa3639f8645d85700e380ae85567fd4a4c1f2f36631e326a6726fcda372bab301fca9d35bee31a34bf0923a01ba8d378e9c553cb6fece311ddb1ad47ae8b64", 0xe5, 0x2}, {&(0x7f0000001b40)="57858bcbd7ca3820b297409a5fd1f149cd0c27093ea980300177606f531fd26bf6c8e82396598aa4832d2a16b0ad92748d4a75d3017d3dc9e649b4128e2b982997786a5fde92a95945c2564e749fb7e2f9f2e0b7554091fc2d43ae3960b4060a7f2c20dad93ccb598df71c3ff52b50b104ca280109629a8d3c6b72393ee2ce72ab43ae", 0x83, 0x7}, {&(0x7f0000001c00)="f25632db98d53d9a7aa9900c416b3f151012a7dd5080bace3301e07e0517aa6aa907be7db0dee73d7b1bf92ce1932e80767f172212ac3457", 0x38, 0x5}, {&(0x7f0000001c40)="ef9fb322f4a2cddc803db54ae21e978523e14fa2747bcdaf7d2616d960785f6f5d421e87dcdfa986e9656ae5494cf38e5741e55f6bd7e773eeb5519f32bec3af928366df53d5b8bd5e36856033b66ff45c0b1bf5c12dc94ed1c7a2a9f872333188c547bce89597c0201526bc1df4e1c3dac71ccebcb99481f09d6c97f5a0346b6356e41158f5d1195b5a8fd89014f76f9b10ef00eac294c87bc41444d3b781b8864b72a721842732dfbcafcf05fd73e6646f1d368422d8d044d1f549e537c6eefef4dd1b9ba5e675ec64ed205e20da73e24169fd18fc611a3ecc1f17d7c6471392e776f75d4dcac99aef451fb027586d369fd66707e17684856ee667ca29454830b531d5c51091dcab7defba2d75b7ec49fbb1d39ce7d975dde9b0f2157a43a1ba7a35cdb40c3688e343e3980e748f0ccb2be200afb022a2ffeab6eab3d27fbda1ace6ce60d47a942ce609ddf113e175d645ed60168dce1c1be3a693993d9ec55b59566714f0642c6d043209d0f54d6a5c33f6668786cb56a43b4ae5c54195fc6cae3f05931085036ed3af4a49a3e8e3f7c893ebdcaa4b5571e1e65ab05a4c172132508a5fbbb3de9687ec1d837d37b1b9fdabe2fb41579328a7a5d3655f88176a929934e632b54c5e8e46c94a627590d548a8efa9c73e100d64ce4cfef1ca33b9a597b771b8b4431431acd76c18584441d695af581154d549c60f1ff9ecf2b1fa2dbc155d323227895096e7702cc3d2849b276a14a8df0388ef2ba4c0fc342a253c52e4af34bd1610579341fe57e682b7cb8ddcaa048cf1561745c316148c39777533a17e608f09df7b05af169566ad3d182bfdf07281afeca025a967b43fd1158967e102e36a4f5ad02e89b231c3c2a6abfbcbe3e19fe25383dd92812f64aaad7abad346300cb4bb0f209431b9d0ec3e510dabdd7b8373b8bf72e1080c527a665da7e7c09468a98cf64219111f4fa8233d2711b8290a85a53831e490b6aec07700ba9478920277a94e64c2c7462263de866056ed7ab4a5eaca263b6a7fcdd9e6ba5a01e57ae19a6a9c3d5f60f5606543a8a6817906802f082975808eeed0de8fb47eb6347f433391f995151d6cd2572018644138350376f87f997b1f371bc2c762b6c310fa1ecb68750f89c59b70176b8e396ae0104ffce22f6f6b08466b79692dc3ea2a75cd26e09c37f5eb6e81c3d94ddd3a82f4e51477c6e3cfd85cdd96626feef10e814e2c2cdb5a521f1ea189cdc65d03c9dc5948380ac24404f5d27e3ddb79afd719698325361cec07113b30d6907b6a8469d30c9f71f9d467b076719924206d80580fb059c29d64f5ea8129bf54bdbe758fb1838d338adb57b0e5aa027aa43c021c56778ad84201d9de210bf36e67411a44e8a6b3f4332a045c438f111e8cf466727e227999146fde5263c4a17aa536ac30d0527b51f7edb9ad0c82989432063d2de417b7f546f9fdc69f8adc3a9679f88b136cdb37ccfb74a5833ceaba4d4b73ed8261043f48e4dd95c7f10a70525f8a4e0b2b3037c10e7a8fce29bd0346ab239554632d8f06dc83608aac4ffedc1bfb7e4a17edf0bb30e2de207cf195633a6cb41c6f650eae54fc9c2e62328ada0299ee85d71c57801b4f5448c7c61faa0c3886f269a0cc4cc19bea77894acab724b4640ac09a6bfa3300934bb3a60931f9cb1372b387a4211069cd5eb489c52210df0107fc507e6c041935bb96b22636c0a1dfde0b54bbbc3c0c1a728b56fe45881ea1fea9fb686ac4303e89cf86ae41ae7126f9a4b5d38865e3d44981e11fca696feae637e2eb7a1d7b31ccc921496166cb15d95c49bd6a080d085530bfc0a6eb2f48b38a50e8d9d7b0ac86178b96cf0f0bfa03bcba3ffa9441970962c34b113bc528926c2c2b7ab264ab6eadab647237da6ce875c76d962204dbf512d26384c0b1a4c45d8ca31095ca533f1a60cdb5109b3eb2dc108306d99cb436419555d79b6f702b15efff8ace8b185ff6c4e84deafdb7b9ee4c2ce045b6bf6bb456ff8a8b1d8782d5990f3754070663e1b60db4e199828beb5cd161e5a1825724018344b4eeb128ea796a74f96c4664c12377b630922e2e33d7abd08b23babe895d0f2aff9cfb2817151600c031df98b067cfad1da1882424df175571d56c6f605f0118c61744329816afa7ef165945e2a5018c4ac17f9a40fa7f507007fd5a8b1edf07d7f57c996690d399c1b8f2b357aa64fca90785c03e6292e9b3b6d2b77985f2d8e954f4a1b6b0ee69fef084271b814f3f78ae444a0b06419a5905c7700f27519b1e67aabe64c6bf5a50cf105d8da7056ac2ed96bb7c52d39d0d5c6add1b55f746ae9baeaa8d14dc7e7a7e20f120fbe2a04a89f2d12f5437e46863520a69661748d83908e3ea250d3a5bd585e928b79cabad2071ebb065a0ecbab492b2b3df9329af60e49978db180243c3c2fe48ba64bdb0690a208ef928bf71969ba9964bfd7a4f1e18054a8a57c720df6c8284a9081c63868f64c8e462d89baba969e27a1ff36282ac48bf90d94a5605201f156a90fbe4da8af7ba3d37c010bd740dcfa8c7126c4cc87bebbe668369a5c3940db254a0a9b7d487ed224d10a6db2b7d0955f0ec1a4a062ebba6cd571af23fa23e28c7a149104d99578939544cd23a06083a4bb9af62947b2cf7805e168ad191925989b766344107082231c7675825411c4e4ef0990aa1200b642cab4dbae28168b2240652a89e6a65cd0e70c0128883b46b0d1d66721b5efe5bcfea4814d1ffb6ced84e2244227eaa57bb303e36ca97bb8c3c5c5d51e5cf78537535b60ef4ac138095a4c4ee13c1a9fce1f19ef7fa03949e91002d21941f108d83f64a89f5916d7f98e87807d80752766b9d7ddf4b20d884339339eb0864fdd81bb6dfa20e8a20f02e018de40d97a591f1bfecd85d452098ae45e99502747125b2312c57223530475ef8a59b7afc53978ff2a624634cf11cdd533da4dfec9d03220e428574dbe5d9030e8da26f2b0ed3fc3e2c8761a00140418db88e43e6af0731296aa6181dab0ac7967b2efdd476ab48f06613e45daf726061ade2cda897dcbbf3805a0c7deb804af7f81fcadf839e4ee06120725c065b8a0e5a474a551b53370d614539a30404ab85ccaabd27643ff528f01084e127076af7b6cd03864569b20bff4f94583fc1f6fe4af30d61214cf0839220ec10020ac743407299a0d6867a5c70bfe91aff763fdc8920f2c4744771ec599c935ff885c7702181eac32c60b0c77203c974d8742fe1b4abd6b8ca9ec4d66b7255c16ab419de61727d8672be933483afd7a5ff85565faef4b6906e99e423c7c700b9812ec2ae17bea1c486ab5eafd212a6e8f5fa3941d9cc09a7d0ffdcbeb9ebef575604cd659039eb2fbbe71e52444da6770a923b25674286fe24e6c742e7dfb3e8c5731c33e244a9e993dc2fb19629a8f20f03120a18826abacae5ec61cfacd816d2db6c6542ff4e868650f568d2a1c2b085cdfcd41fa8e0a1de55a784e09c4b42dd50be5ae76026ea1fe59e0bb2c1a1163ab0bfd02bf7d40ba977311a642490b0a68eb19008eb1418c54df83e3d75a255c226111aecdfddfe6ee4f73a6ef9429e850c94a54fa57ef01f4332b9002b9c492dd0d3e9b543ff951be790effe3c9b840014d08c33997a4f0c3fd47be45f1f6842ff58ddcd7434278354b0312c7db26b44918584804214c61ef18f2eacbc596e3919163ab6efc5f33af248dc8f1d337e6c298d722ce231077fecb6bb60c7760f4785055a4a9ed191c0ada70a2aa192c710b8d725bb6ab7f723d617f3990a15e430246bc2cf5c40fc8023ced6d6f976990eed5750aff76e07beedf32ee74387bdefd6e9fa08b22b5c5a828f21ef3441c4f0c65bb562628f8fa8107e122af9b9f64ca5e63988e5359c9667d6041f971e51899b116cb3f89f6ce7646ab27471a17c31f185aaafd3cb97b6142d595eb0d1a8b04d356c613634f852a5f1597fa89c46a3309160500ccde330146c22c9840dc35197c88ab6b8ca45ffcdf38f3e9295da45f7121b8040fb9b9bfcc2669cd06f21720a42985066150aadfdb021f11597b1e2836d0fa47306880e8fdde9cb401c51f3008a37bba0b2f153ebb9badf58910bf29c0a421e039bfba544c2212eb689e0c3616367cdc725444f53e12aba0247924c6618861972fb259107f9dfbb9ac39612f2d283807021c6a8dfd3a0e87ce26c93482e301db89f3e079aacac1ad79bddc1bc3c7a34f3e1e74478d4d46f96ac4b572cebc3f8e960b3766f5266f1dde17f6a69d8c97d32cec979c5196c2dc7892e549ba62aee1eb36a51d4c6395e4c8774589d56c7a9fe5a52e8ab7c00fb21605676ad21541442d7134efa29d2f5cbeb7a96618b79c177f6ecc9ce201fe46b9b47741068f3818bc473bc31e858b4cf423b68f7871b069458c0e9933b00db3e25324884242f772d6484efa4381f1a33b41dbe7728bcb4236326cc4149dd1567894922c7ea3f7bbb36ced9e3dbb7f77add921fc3293ddc9852a73b79bfa6814d1ecbe01c3e30dc01eea89800850ea76c6d8c24d2eb98c82d3919172136a69c1409fcaf282c887245635cb9f0bc62be1bfb4f9521ba5a134ec01f2abd560d7490e6e362c71786190585a194eb83ff75025ebc042e52a72dafe184898e63ec7007c111a3d62ba826bd2f4fec489bef66a461981baceb55225d2571574503ae7de50a774b42975e79d45ab4d577cd6c353ce5511dd26384b7a3d28023cc0c54cbafc1371f7d9a135ef6148d54a0d240b702bc24e3867d1cec20f8acd827e35dc9554b732ceea137efd22c0fd516ed99b0ade7d6807ef08665ab26b72ae0feb8c7b779574e4fd879c98106943b39641362222adbe1ea52a1f84601359bcd73194a8d55238932deaa7dd734eea4fee05b77f06f91d523b48e97f20b9ca6492176243e1e500f91e18f0bcfb648a8f40a01e6b866fdfd3a60e8292537b74872ab9cbb4f27edeba063d85daf4a6563ecde84c3fd71aa44c62fe44e3e49d4f476153d01bd94ab231cb56c1a28d5728c826e1e87339dd3037559ab184884d72ebfe9846c4810f4e049dd080ec19b2d0b03f11d8518c3cc3487bccb525bbb9f2daa4b3d03e1883c7e09955b6e185648ef7532fe31ac2e2ca1f84717452cc08d526e0d0007403111c089b06c3a9f8b49809f6041aa50caa31183b64b354a2414ba5217e8ba11045d84a1d305c83dbe74b154b2f383b23110b8d9c999f0c06ed0625b58487efe6a9feb4addd32cbdbabe66842527e88dc8be1a114ee53ed6981e82dfffbb999d23b815fa522cbcfb76fa41de683ba9d85bdcc7384e96b26ff58389f1d22068700288c5e779dba35ff3109b232aa21698e146b115de4071b05686df23935fd2e1c851c783f70be63ce6e2d47a84bdaa6f4ab87d0eb47d9a5342ec93c2290a3390304dfc30fecbf17ca43dc7ea22a7a06798a6169ba4f057cee1c6ea621165ae6cfb26934b0ed5d0d7fc508bb0a9c13f619d8c6bd0b0c20a4f9de0d75262a205f3bed102cda06ed4747bacd5ee5e73a468d94cbdacded2c96011e28f844ddd27b4c815e5a9e1302090fef98c88be4c259f632130e7268ba89abde241bda87ea245ea518e52ec2790054dc370349b0f4b3b224d256966caf4246992e54ae1ee7d3401f5acbc483db76be56d347079af698173a3360680b7d8e2b2a1db3f9630f2232faa2ca0b21717b90331bced053542934be47217887222a4958fdd0e3c752f6cbb6b7990bf5c17a69ffb84bf7e0b5042739e747c128efdf2d98c2bf6f0a8fbc8bf594a", 0x1000}, {&(0x7f0000002c40)="eae19ec30fc3998e2d875c1828f12834ecb07287def7c75583477a74029fa23445b3c9e6d4621f1740edc2305c141aacf1c6a1eeab7fd40cc0a8203dcaebdfc229634571e9d6a2c7c2475b79b9b6584baa6cbe73cabcb45dba969ab5ed94648d1de680a2d2f6eb80fc9da274338bdc302ca3d7c5c22daddce22ac54394a3ffe3ad5774bcda2ad0718c4ad66932545092a0317e34a3507c4ce2d7d5", 0x9b}, {&(0x7f0000002d00)="31468b8b3f48d7127862077e87dc7fa0bf4c5833c16ddef8450a0b48f4965764f58e3219e32434e783f539a2d7868a658c14368333ad32372e50ebb42fdc62fc1303362502f82ad67cc775fe33afc421db837b18a874fb8998c6a8ce8a74ed1a6b93319a8157a5879299f5502f43d325dcb4be2c7fc52153140038bb88e539cf10db159d77d90e079925bae6b2f62913684729b9b62b71dec3e4ce1799fafc816c4a5e981ac98c8ace5d9ed71e2dcc55eb8c4fa47907efc3f246276a365a9613958f661332545a74553a8b0cbb752b787ff7e5503ef1111447ac77450b882cbbdc4d990423ca3947b3db", 0xea, 0x7fffffffffffffff}, {&(0x7f0000002e00)="17c2cde9a27359ea443ea7cffd688f8ff1d80c2ac80a8fb5a89e007b62fd6e7e23b33f075dbdbb5a92270f86d60b287e987ed3258f0fe06c95b4e3b17998219d0cd55fcd75c33a701dcaa82549fb9a282481bf55fa57a0941adfd9996f4846f5f2b45903eed792c5042d69181cf9925433e4991c18328f187d80b13d15c85901c424beb002d22744b00d0933749013e1e901c0cba9936b9d735a601d7517de4c50450a334487975882d18c51f2add3e7527afc29cae55ad573", 0xb9, 0x8}], 0x1000, &(0x7f0000002fc0)={[{}, {'}+'}, {'net/dev_snmp6\x00'}, {'uid>'}, {'+^)&'}, {'\\#'}], [{@smackfshat={'smackfshat', 0x3d, '}/@\x00'}}, {@pcr={'pcr', 0x3d, 0x20}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{-..+'}}, {@fowner_lt={'fowner<', 0xee00}}]}) execveat(r0, &(0x7f0000003040)='./file0\x00', &(0x7f0000003240)=[&(0x7f0000003080)='{*\x00', &(0x7f00000030c0)='*[+\x00', &(0x7f0000003100)='}/@\x00', &(0x7f0000003140)='uid>', &(0x7f0000003180)='\x00', &(0x7f00000031c0)='\x00', &(0x7f0000003200)='uid<'], &(0x7f0000003340)=[&(0x7f0000003280)=')\x00', &(0x7f00000032c0)='$,({\\$\x1bz*\v-/\x00', &(0x7f0000003300)='omfs\x00'], 0x1000) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) r1 = geteuid() syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x8, &(0x7f0000001400)=[{&(0x7f0000000100)="fc498dccb100c9307105955aede85a3eec8c107fb585cbc5f49e7d0338e0b35df58408f9dadf", 0x26, 0x36ab}, {&(0x7f0000000140)="ae03953cbdca582146966d5d31fefb8499d84c22d2f5c1dacd1c63baf822920919423446e07e87bfce16d4b47d7f998358d80759ee2336aaef3976957e353db87d1131d09d9269fd03f6a0bf230b6236e2bddc5745705c90dfa9b47d21dcacb2aa0b7594918f3ec8094b7feddaafdf25caba79c95a04cf8fb6b6604c3fa46b9dcf83b09e64b3e188bfa09a3f6e846ae35ca703b5f71c3769ff8c3a375a0b436a919850cb3ec71c22e52ae272d05a2b4b2e797ba2005eb3bc24d14217b93242380f5922d02f89cadf71241aaffbb9e0cef6959f31cbaa1db581e91c6709af75b3625c2d850fabdd2c1c0ac0557e618a8204dc9a48044a9c66a1b5d0798a5f4aa18ee08af4e51fc3f597a282b45a06510f10d9af2b576111c477de3746f124587cfea5a2c28ef25dfa8d8ce42d2cc324438de01279e52c052e272ed5a6c8bef5f48499ba567d54e5318e8d196851563a11670be065df09858a7d75b4346246e415023bfdb7d87de81bbbdf8cd2e48258ef6e485a151ddc6dc87a91a1ef6306974fe6af55af7b0d3d4fdb5cd95c716007f39f26cd1a3228431a10373a4de65e089da2a9d7cb66160946a6212eefa4e537d023320020b0e47ed1dd3b586ec518a5dc85ed0d0094593d5f57f1205c7f10acde2b2fe83b2a849f47f763bea4ed26edc7d4eb7a1b68714f49d0bfd245dc38d7b5cf7f3afc9c3ce514e8b32a4a922309fb03f646164706af8cd4673fa000641d58616e1b372db1cccce1d7dbbabba34b24d08d6f546aa9fe1984674a1cd71821a20aca57a38bbf636390e87acd886bafb0540c969844ab20a3ac2a66b65925b37afd7d739962e38322ad727a2acb3d26e815fd489e2f372bcc20ebd2e5325ecb7eee4f5ed0ad9a58b5381e9a85f4768c7231a28f3b93a59c3bdf4f461f6efc8aef27ed0944d2b1b82d8852f15891ae188404d0f66bad9c254611b1f75d584995eb5b7e001c3cc2a7e8f05a9f50cb5197e1db99c692b0eead881c5d29331ea43d6f97ffb6680464e9f416b73d6001ebae7c62dccd4dee0b0c5fe791a22c2958094a6fd7a071379fdb4ed50af62c511fa2694e1f4a78c4b95fca3ecb26faa4bd6f37757f994675fac3d35e177ef9d3439d2cb1833e4ac1f7903df0fc86d6749c7241b970be3afe875f7f02a0cf54cb4ccc83fe3750674e69eb806e513ef82e12eeb48cef559be3e112c1587da3f115a3c7425b887258b926d81bc52f26d5311d4c37c2c529a0ff40fba3aa5732c30a8adaca239111ecc20b94e6421d4cc64818ba1952441b756798d3c36ab4f50edd64f10e88e2438798b7e246bba2ba43aecbc08090e535d5753326a3bbc5e559a43d5f97265936d99a24de63c77d2d83d32440052a35aee46e1db72819be4c8d3ab6f3231fecae317642b3c550f013aec008df4ea22ff6007531261d9722df898b31f6abf446a3068841e6817004fa9b1188efc69b4e40fb5d428a3d06973aeb134a9af424837f2da0b25a1ac57e73fe0a7f21c85c9abf69ce613e87a0afa074fc6263472d338b27ac4ed02f3fd5e6ab8ca3019b033934eda3337dd434989bd01b380ef1aad3069ca2926ee728981da45633fc28b076bf9f0986f2baf2a0eae2797c411cc53119944afd5a800af57409db2b2de4947b349dac266e25cebdebd432f7c90e26e9dc6020873b7fedd16a4e3490deef8cfc7ba66a1cda8fb935cc8680d5b4d67ed983650ca0ff478e8dab18b770bb4de78529e473f3da1781610221f95f9672a8b97142890b5996775fddbb89c4a61b10293180e32e703c174248a55dd98ce41f989ba49c9a7837cf8e7f38d2201d512af563dfc93029d6dc0f54c6eca96acb5f61e0f0e90bcba79a2fcb598f50ba32f4dbec84918aa670d202de74e9b8fb83a42ae8ad74dbc0261943dcc9cc06acd21ecda5c3c7879da53a350237cb2f0c4fba4eb2f8a603fdbca05a93408e8a70847043197b976566ccfea791f0e8f360adacefc0809699c3e3b678765e7eebbefb8d846c181ba97d5c21d94a4055a7ae2b1ce5e2820698a6dc760cb519e620ac55fe7b85bf42334994fc91c280f2fcd33a77fe5435cc43379fbfe00bfda3cd0c779ba87983a60844aa9fc151b5a3913adfdff871ecef08d91d34cd284a3ab378e9b6c42fd8db5dcec34b6c6eba207bd22ffd54b0c938c6752bded186f6711d591dc9546d10d8c33e33fcb4e7247531b844ab61cefe04a793f153099227ea2daf95010e464f0ea133e466e7bc05108374da1fa30c62c7454ff760e6b09e7cc8069eb39b2b5ddf9bf85748f8cc67fbc2b2a019c2d42e04ad090da935d114c0bbf5a79dfb49103b31400454db45a68a287f9508ef71ba2ef2802b4b71a59c7009bcbc486c588fe1d521649356ed73c0e132eb2e18ab1866ecd9bc320785d6e35743b26550d286b6846cda7411ddd152f411562804182752b01a712c1a3618b3ee2584b0379d5ebbbffd293fa9c2847ae5ead1a8b43cc38000884f9f13cb2de1d076ce5a13961e125d2da7da1fa15a4203c29fd293254f5f16dcbc94b5bba34bff6b5e2b79fa1be612562f61aa5707cc25f3d8f64cba7ab1d70accc1a8cd9e94317f9fc9d44542f1debe1553552a8c87809f574e7250cf5a6838aa4443a246c9b69f85035024f0913781663aa98b0d7809ad25364f40c8f857d2c7e5c8319f871814dc957ca19d5f2d84e51cfefbbebd2a8755097deb331b06d8db331f35d5f6445a7470f4740344d562532d2ae68f546c8d61e7301acd6aa2fb3aa86f20b9796cb451b9d4db72a0049214f2343f5106f0a6fd001748788ab4410d3507516b5cc278829a427fb08db87c1819be0b1e0c149cd27470b833f77fa3b4a2b608407038e0775514cd586dfe5da928e95420d590fc93b43d969cb6b93aa3b49039877bee59c01b58536783a8abd94e5736ae9f1f39e25c80afc75f1db1150f6da8fbd4d89c8f806fd06083f682a98e125e7030ce105f983bc0344acafbf3e27ca0653f0069561c7d4a2b2d282c8317b3fec2c29ce69dd9b4195cb607635f37c0a0fd2bd226767aa460188b368bcf7ccceca7d1405cbf3d637aa644f31fd7eeaf25e6eb6dbf88634fcdfad44eeb3ec2f02445596b1e79177d573b4993ccc33adec963585a0a41fd128efa6863f9433375d61b7c2b0dce138d03e01fa9113b49c449ff0dfb9744f8492784aacab895e97baddc94dc5780720cfcada20ee3c88abf5b7c28c8d1e53ecd009a0919e3360b9029c822a3240f90012d344446ba8fb1aec03877184261e386c34c202394aeb591628c7c8d4582c4337fa5179d1ad8f48570ea9dc4a4e91af9df6a875d47f1bfd1f122e0beaa4543bd3350600b4521bd59403f41a69d6b722e59d3917771d61383d7e268019f3cea41cdaa4209e5c139d3564ac12dfa1217d4d0ff6e0c36c50a8fc76c221faa1cc3341f12f096034c77496b81d851df259483a56b840308722d193bac668bc50efbb41f27620cf92f826536eefcf9f022c93b6de972caf9076cc6ec416c058041913dda86523b2adf0c64145e349108a24ab52a630ea38e2e3a4482072a9451a0c2e47d438a82a5ecb51e51a420ee50c775e6104082056111f2714eafe9b629b815589a6a3c05538ba62b4aa335d6f4dde46c73cd38d65aadc4f000c6281e1642792cff4d006230c9b606fdbe4ef50fe0c443e40d5e94b6349700a37cfe3a97185ad22dd6e92b11eaa7c812625bc13500591115a04fbdb56e0b117a15cf3d3a52a809ca0f8ccc1b26664d0b52d1c1c1ba943da85153eee333186f81f56afa105792c69c2f1d20224532b28b9c45bfae2b8c9394a2087240925fd6ba9b50e9b0786155b7f03680f7eaeece7e7aacd0e2e18c45e04c508e9011e28128f88ae296c9d7e39723f0d62931c80cc31713937cfae6f15666bddd0aa7abf80be69e91514606c55b6f562d7b7cdd602a6d74e91db5f08fdf519275c168dcda63aa0f3f686744cd2159d44fc99befbbd4a70af3f826cba35203cd364987007c47c6cf42a4086ae74c93764a12a4710def0dc2c0620f8ca1b0a918b9f7194564e2919aa67681ecc1f1871b425c40f3f27ccc44cf1fd5e55a6c37f0cd621c7ad191340580d0c601864559e70a4d661ccc4af22e119f1dd86c56eb32217ad0b8c9d988df164386ee14e3c0ee6ec6d8b8885a1fba0ee42a517130238c6412e21724d56c5aef05f2e8c0e4f5ad4d94fdeb9f15fc42ee5423a6ba284968a7570a6ec5b1e77c4c0dcc225af02356354fc9e439ccea2685f4ad9ea7e3062f269b33c19079e636bdb03f2f050346fcc12a81f1177ae4377db6e6c9ac31e0725e9fa995190d91f939f8186a0fb6415e8ba544cd12c860a3006132a3b2b69423cd573562dbfc41ad8a358964a52aa43ef81555ec15da7b58d7e5efbe954a5a3704784ce8f31419a1146124f309e43b2cbea5ad3796090380eb6deb67fc02748c7d534eb242a165826e88342e80c4a93c43580847c474c60bfa5db53274547e3041b711561c9373104454194ad8b9574e63ea31d7b587277deff608cad2214154a4a25dd85c04585951263efd7f481a4f9e4fb9aa2986312d90f05e03fe6033b363bb9f0f65b5e5397d40fd2d71c9b51583cebe577a1882a83e06a209cbab43113a696839662e36e436dc87733ad70127526bcee64c2cbea5e4e93cd2c4a70bb83d538957acb3cbcee8f6173c819c676169498e771494b962dc1b855e4a5c06d0ef9d88c6f50b53423ac938153bd5a66a4dff1f4225f30fd429851b7aba0ce88248a0c14ef8fb780caa1eebb51904a187b28156ac13618903bfc951b3d35b76b0ee2681879b411942e853b2b98955d6c45519430a86eaac597b9453d8818492df86ca59848f8b4309b003c89c7f08cac842e5291f462a55337254e1bafb81d210467d3095ba4622cef370e3c9bc593d83b1e5954f5529492878270c986ab638e7b1bac98a3b5d8cb1fe56f1e54857473e00c9d86c5a57e4f7d99a1969835dfcd6905486873102f899ecc4f5b6ed8b9ab1d71222f09385e944c9612df9a45d6366393482f2bbb886aeaad6d2fcb7b955594d3b3f296da8f6b9220c9cd265ca050fb874b85428fb10066fa83ddf4e6db23c20b882c192df32d837e767dff94105cd0581c0afbb0b29cd8468b4217e0008a9acca91d8c9dc33f6c390e898e6fa7700275c176fb9a55bc2fbd733616a14ba025632f4944ffbe519a31af6656f1d79a41b8b7b1f06c797368e04f9f90326c38bf4dbb66e5f0be31beea0c15de7d93fcf418fce1d345fcc69959748ea9f36ad90b6f3b5c69fbdc70e3cdfd8e0cb30e6bad60097d8f1baabb7b1ad558c5d13f37c40b9028dff0269870fb3896639c78889f51220f5ffcd68284bf2e5f123daab60c1c12c3b0e5980e790f58fc8d82edf3f5435eb7ff4ecdf3b6b075fad41bfac02b5f3deab79ede6179e09dad05deb6cb914ec4aa5df52e173fa20390d9c1ae089dd76cb326caba44f0c11b2088b927feca688f1e8f0c8c468b4be5ba2b6fa695738d3670ddc7ab10eb7c13b79c98ab946fd36223d8c94aa1becdbcd69344e5be049b6d42b03730737dd81367dbd70e5a9a0def9eaa0a33e1fe2dc30313a1687c6a33bcda012169cc0bcaa7fb305eba80c2bb529ae6ad7188e39da55db618961f250973be27fbd638b33e64a1b4616e79cb7377a5008b8ffaf61ef986135a1f53bd31a0a1ec29d14264c0586d711f0f279479a3e9118430b198ad750086e048fca6e1f31661f5400db7d2dade072f5ebf1ddf257e6823127745873bf", 0x1000, 0x800}, {&(0x7f0000001140)="a83e15576277a0c9637aa75ebc7e7e1a09069ee46d8fef2328a4296d82ed59a4fcc34abb0e138abc6b98f170dd63fdfd356544911402c89f93264457fec87885", 0x40, 0xead}, {&(0x7f0000001180)="60a28cbbc623c563285ce589bef3321fe306813c5f8fe5824dcd", 0x1a, 0x400}, {&(0x7f00000011c0)="020afd26147977e01b6085eb6fad0562229f8bc9d27b75074abb297340e38d4763eb89ab3ce3212971cbfdb30e9555d6bc8ef38b9dcedb1f22723cd5d889894e6806f587da805f626648b42f00193dcfabccca4ced", 0x55, 0xb27}, {&(0x7f0000001240)="c64e3910e659d4a32b45fe89fdd47be755", 0x11, 0x9}, {&(0x7f0000001280)="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", 0xfa, 0x869a}, {&(0x7f0000001380)="a6e0a79d7fad7375b58b98d40e2797c1439f2468951fbb232976f17cbde05e62fdbc3dd95fe3c0aea3f8a052ec92892c7143a3a29bda85140f7b41cc8b8f15efcfd03e83555025c1288c1886e8fe642e797b9d3eb00902ad724069c25bd377a38207d6a589ef213d7d29a44945eeebb77f04898211", 0x75, 0x2a}], 0x40000, &(0x7f00000014c0)={[{'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'net/dev_snmp6\x00'}, {'}+'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}, {'net/dev_snmp6\x00'}, {'/dev/vcsa#\x00'}], [{@uid_lt={'uid<', r1}}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) (async, rerun: 32) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000003380)={0x10, 0x30, 0xfa00, {&(0x7f00000019c0), 0x0, {0xa, 0x4e24, 0x8, @local, 0x3a}}}, 0x38) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 05:45:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:41 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) 05:45:42 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6}, 0x20) 05:45:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x3}]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000580)=""/246, 0x29, 0xf6, 0x1}, 0x20) 05:45:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20aa, 0x18100) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000280)) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000580)=""/246, 0x26, 0xf6, 0x1}, 0x20) 05:45:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) 05:45:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 1) 05:45:42 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}]}) (async) [ 1047.148573] FAULT_INJECTION: forcing a failure. [ 1047.148573] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.172356] CPU: 0 PID: 20056 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1047.180268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.189629] Call Trace: [ 1047.192228] dump_stack+0x1fc/0x2ef [ 1047.195871] should_fail.cold+0xa/0xf [ 1047.199683] ? setup_fault_attr+0x200/0x200 [ 1047.204013] ? lock_acquire+0x170/0x3c0 [ 1047.208000] __should_failslab+0x115/0x180 [ 1047.212242] should_failslab+0x5/0x10 [ 1047.216047] kmem_cache_alloc_trace+0x284/0x380 [ 1047.220721] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1047.225657] btf_new_fd+0x1d2/0x3800 [ 1047.229381] ? apparmor_sb_mount+0x970/0x970 [ 1047.233795] ? lock_downgrade+0x720/0x720 [ 1047.237945] ? lock_acquire+0x170/0x3c0 [ 1047.241929] ? __might_fault+0xef/0x1d0 [ 1047.245912] ? btf_type_seq_show+0x180/0x180 [ 1047.250330] ? security_capable+0x8f/0xc0 [ 1047.254489] __se_sys_bpf+0x10c2/0x3a20 [ 1047.258471] ? check_preemption_disabled+0x41/0x280 [ 1047.263494] ? bpf_prog_load+0x1230/0x1230 [ 1047.267733] ? vfs_write+0x393/0x540 [ 1047.271453] ? fput+0x2b/0x190 [ 1047.274659] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1047.280027] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1047.285050] ? do_syscall_64+0x21/0x620 [ 1047.289038] do_syscall_64+0xf9/0x620 [ 1047.292851] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:45:42 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f00000001c0)=""/142, 0x0, 0x8e, 0x3}, 0x20) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1047.298038] RIP: 0033:0x7fc3b06a7109 [ 1047.301754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1047.321007] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1047.328725] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1047.336001] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 05:45:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:45:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000580)=""/246, 0x26, 0xf6, 0x1}, 0x20) 05:45:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 1) [ 1047.343277] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1047.350547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1047.357820] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 05:45:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) [ 1047.465085] FAULT_INJECTION: forcing a failure. [ 1047.465085] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.492835] CPU: 0 PID: 20082 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1047.500756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.510118] Call Trace: [ 1047.512717] dump_stack+0x1fc/0x2ef [ 1047.516358] should_fail.cold+0xa/0xf [ 1047.520168] ? setup_fault_attr+0x200/0x200 [ 1047.524496] ? lock_acquire+0x170/0x3c0 [ 1047.528486] __should_failslab+0x115/0x180 [ 1047.532733] should_failslab+0x5/0x10 [ 1047.536538] kmem_cache_alloc_trace+0x284/0x380 [ 1047.541220] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1047.546157] btf_new_fd+0x1d2/0x3800 [ 1047.549883] ? apparmor_sb_mount+0x970/0x970 [ 1047.554294] ? lock_downgrade+0x720/0x720 [ 1047.558530] ? lock_acquire+0x170/0x3c0 [ 1047.562507] ? __might_fault+0xef/0x1d0 [ 1047.566573] ? btf_type_seq_show+0x180/0x180 [ 1047.570991] ? security_capable+0x8f/0xc0 [ 1047.575149] __se_sys_bpf+0x10c2/0x3a20 [ 1047.579129] ? check_preemption_disabled+0x41/0x280 [ 1047.584167] ? bpf_prog_load+0x1230/0x1230 [ 1047.588408] ? vfs_write+0x393/0x540 [ 1047.592130] ? fput+0x2b/0x190 [ 1047.595346] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1047.600719] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1047.605739] ? do_syscall_64+0x21/0x620 [ 1047.609721] do_syscall_64+0xf9/0x620 [ 1047.613536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1047.618725] RIP: 0033:0x7f52933a4109 [ 1047.622441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1047.641341] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1047.649056] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1047.656349] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 05:45:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 2) 05:45:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000580)=""/246, 0x26, 0xf6, 0x1}, 0x20) 05:45:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x7fffffffffffffff, 0x101000) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) read$usbmon(r1, &(0x7f0000000080)=""/169, 0xa9) syz_open_pts(r0, 0x410801) 05:45:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) 05:45:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1047.663623] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1047.670903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1047.678179] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 05:45:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 2) 05:45:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)=""/198, 0x0, 0xc6, 0x3}, 0x20) 05:45:43 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x7fffffffffffffff, 0x101000) (async, rerun: 64) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (rerun: 64) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) read$usbmon(r1, &(0x7f0000000080)=""/169, 0xa9) syz_open_pts(r0, 0x410801) [ 1047.813884] FAULT_INJECTION: forcing a failure. [ 1047.813884] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.819232] FAULT_INJECTION: forcing a failure. [ 1047.819232] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.864385] CPU: 0 PID: 20103 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1047.872296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.881651] Call Trace: [ 1047.884251] dump_stack+0x1fc/0x2ef [ 1047.887898] should_fail.cold+0xa/0xf [ 1047.891708] ? setup_fault_attr+0x200/0x200 [ 1047.896035] ? lock_acquire+0x170/0x3c0 [ 1047.900059] __should_failslab+0x115/0x180 [ 1047.904307] should_failslab+0x5/0x10 [ 1047.908116] kmem_cache_alloc_trace+0x284/0x380 [ 1047.912791] btf_new_fd+0x41c/0x3800 [ 1047.916515] ? apparmor_sb_mount+0x970/0x970 [ 1047.920924] ? lock_downgrade+0x720/0x720 [ 1047.925077] ? lock_acquire+0x170/0x3c0 [ 1047.929061] ? __might_fault+0xef/0x1d0 [ 1047.933037] ? btf_type_seq_show+0x180/0x180 [ 1047.937452] ? security_capable+0x8f/0xc0 [ 1047.941606] __se_sys_bpf+0x10c2/0x3a20 [ 1047.945577] ? check_preemption_disabled+0x41/0x280 [ 1047.950591] ? bpf_prog_load+0x1230/0x1230 [ 1047.954828] ? vfs_write+0x393/0x540 [ 1047.958539] ? fput+0x2b/0x190 [ 1047.961738] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1047.967102] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1047.972118] ? do_syscall_64+0x21/0x620 [ 1047.976099] do_syscall_64+0xf9/0x620 [ 1047.979908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1047.985100] RIP: 0033:0x7fc3b06a7109 [ 1047.988811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 05:45:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) [ 1048.007717] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1048.015432] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1048.022705] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1048.029977] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.037244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.044514] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 05:45:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) [ 1048.067801] CPU: 1 PID: 20100 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1048.075731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.085088] Call Trace: [ 1048.087684] dump_stack+0x1fc/0x2ef [ 1048.091323] should_fail.cold+0xa/0xf [ 1048.095138] ? setup_fault_attr+0x200/0x200 [ 1048.099473] ? lock_acquire+0x170/0x3c0 [ 1048.103463] __should_failslab+0x115/0x180 [ 1048.107709] should_failslab+0x5/0x10 [ 1048.111515] kmem_cache_alloc_trace+0x284/0x380 05:45:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 3) 05:45:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) 05:45:43 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1048.116195] btf_new_fd+0x41c/0x3800 [ 1048.119919] ? apparmor_sb_mount+0x970/0x970 [ 1048.124330] ? lock_downgrade+0x720/0x720 [ 1048.128481] ? lock_acquire+0x170/0x3c0 [ 1048.132462] ? __might_fault+0xef/0x1d0 [ 1048.136442] ? btf_type_seq_show+0x180/0x180 [ 1048.140855] ? security_capable+0x8f/0xc0 [ 1048.145015] __se_sys_bpf+0x10c2/0x3a20 [ 1048.149002] ? check_preemption_disabled+0x41/0x280 [ 1048.154021] ? bpf_prog_load+0x1230/0x1230 [ 1048.158276] ? vfs_write+0x393/0x540 [ 1048.158294] ? fput+0x2b/0x190 05:45:43 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1048.158318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1048.158334] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1048.158352] ? do_syscall_64+0x21/0x620 [ 1048.158369] do_syscall_64+0xf9/0x620 [ 1048.158386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.158398] RIP: 0033:0x7f52933a4109 05:45:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 3) 05:45:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 05:45:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/198, 0x1a, 0xc6, 0x3}, 0x20) 05:45:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 4) [ 1048.158411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1048.158419] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1048.158434] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1048.158442] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1048.158450] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.158458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.158466] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 [ 1048.265671] FAULT_INJECTION: forcing a failure. [ 1048.265671] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.265691] CPU: 0 PID: 20132 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1048.265700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.265705] Call Trace: [ 1048.265724] dump_stack+0x1fc/0x2ef [ 1048.265744] should_fail.cold+0xa/0xf [ 1048.265763] ? setup_fault_attr+0x200/0x200 [ 1048.265779] ? lock_acquire+0x170/0x3c0 [ 1048.265801] __should_failslab+0x115/0x180 [ 1048.265818] should_failslab+0x5/0x10 [ 1048.265832] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1048.265850] __kmalloc_node+0x38/0x70 [ 1048.265871] kvmalloc_node+0x61/0xf0 [ 1048.265889] btf_new_fd+0x460/0x3800 [ 1048.265909] ? apparmor_sb_mount+0x970/0x970 [ 1048.265923] ? lock_downgrade+0x720/0x720 [ 1048.265936] ? lock_acquire+0x170/0x3c0 [ 1048.265950] ? __might_fault+0xef/0x1d0 [ 1048.265965] ? btf_type_seq_show+0x180/0x180 [ 1048.265982] ? security_capable+0x8f/0xc0 [ 1048.266002] __se_sys_bpf+0x10c2/0x3a20 [ 1048.266027] ? check_preemption_disabled+0x41/0x280 [ 1048.266043] ? bpf_prog_load+0x1230/0x1230 [ 1048.266060] ? vfs_write+0x393/0x540 [ 1048.266077] ? fput+0x2b/0x190 [ 1048.266100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1048.266116] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1048.266130] ? do_syscall_64+0x21/0x620 [ 1048.266147] do_syscall_64+0xf9/0x620 [ 1048.266165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.266177] RIP: 0033:0x7fc3b06a7109 [ 1048.266190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1048.266197] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1048.266211] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1048.266219] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1048.266227] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.266234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.266242] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1048.390169] FAULT_INJECTION: forcing a failure. [ 1048.390169] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.390188] CPU: 0 PID: 20143 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1048.390197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.390202] Call Trace: [ 1048.390221] dump_stack+0x1fc/0x2ef [ 1048.390240] should_fail.cold+0xa/0xf [ 1048.390261] ? setup_fault_attr+0x200/0x200 [ 1048.390276] ? lock_acquire+0x170/0x3c0 [ 1048.390297] __should_failslab+0x115/0x180 [ 1048.390314] should_failslab+0x5/0x10 [ 1048.390329] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1048.390347] __kmalloc_node+0x38/0x70 [ 1048.390365] kvmalloc_node+0x61/0xf0 [ 1048.390380] btf_new_fd+0x19cd/0x3800 [ 1048.390399] ? lock_acquire+0x170/0x3c0 [ 1048.390412] ? __might_fault+0xef/0x1d0 [ 1048.390425] ? btf_type_seq_show+0x180/0x180 [ 1048.390442] ? security_capable+0x8f/0xc0 [ 1048.390460] __se_sys_bpf+0x10c2/0x3a20 [ 1048.390477] ? check_preemption_disabled+0x41/0x280 [ 1048.390491] ? bpf_prog_load+0x1230/0x1230 [ 1048.390505] ? vfs_write+0x393/0x540 [ 1048.390520] ? fput+0x2b/0x190 [ 1048.390540] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1048.390556] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1048.390570] ? do_syscall_64+0x21/0x620 [ 1048.390594] do_syscall_64+0xf9/0x620 [ 1048.390613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.390624] RIP: 0033:0x7fc3b06a7109 [ 1048.390636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1048.390644] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1048.390657] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1048.390664] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1048.390671] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.390678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.390686] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1048.434813] FAULT_INJECTION: forcing a failure. [ 1048.434813] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.434833] CPU: 1 PID: 20145 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1048.434841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.434846] Call Trace: [ 1048.434865] dump_stack+0x1fc/0x2ef [ 1048.434886] should_fail.cold+0xa/0xf [ 1048.434905] ? setup_fault_attr+0x200/0x200 [ 1048.434921] ? lock_acquire+0x170/0x3c0 [ 1048.434942] __should_failslab+0x115/0x180 [ 1048.434961] should_failslab+0x5/0x10 [ 1048.434976] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1048.434993] __kmalloc_node+0x38/0x70 [ 1048.435011] kvmalloc_node+0x61/0xf0 [ 1048.435029] btf_new_fd+0x460/0x3800 [ 1048.435048] ? apparmor_sb_mount+0x970/0x970 [ 1048.435061] ? lock_downgrade+0x720/0x720 [ 1048.435075] ? lock_acquire+0x170/0x3c0 [ 1048.435096] ? __might_fault+0xef/0x1d0 [ 1048.435113] ? btf_type_seq_show+0x180/0x180 [ 1048.435131] ? security_capable+0x8f/0xc0 [ 1048.435152] __se_sys_bpf+0x10c2/0x3a20 [ 1048.435170] ? check_preemption_disabled+0x41/0x280 [ 1048.435185] ? bpf_prog_load+0x1230/0x1230 [ 1048.435202] ? vfs_write+0x393/0x540 [ 1048.435217] ? fput+0x2b/0x190 [ 1048.435239] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1048.435255] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1048.435270] ? do_syscall_64+0x21/0x620 [ 1048.435286] do_syscall_64+0xf9/0x620 [ 1048.435304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1048.435315] RIP: 0033:0x7f52933a4109 [ 1048.435328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1048.435335] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1048.435348] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1048.435356] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 05:45:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x7fffffffffffffff, 0x101000) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) read$usbmon(r1, &(0x7f0000000080)=""/169, 0xa9) syz_open_pts(r0, 0x410801) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x7fffffffffffffff, 0x101000) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) read$usbmon(r1, &(0x7f0000000080)=""/169, 0xa9) (async) syz_open_pts(r0, 0x410801) (async) 05:45:44 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 5) 05:45:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 05:45:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 4) [ 1048.435364] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.435372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1048.435380] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 05:45:44 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffff9c, 0x40106614, &(0x7f0000000000)) 05:45:44 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) [ 1049.203691] FAULT_INJECTION: forcing a failure. [ 1049.203691] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.228516] FAULT_INJECTION: forcing a failure. [ 1049.228516] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.243480] CPU: 0 PID: 20164 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 05:45:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) [ 1049.251380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1049.260744] Call Trace: [ 1049.263350] dump_stack+0x1fc/0x2ef [ 1049.266990] should_fail.cold+0xa/0xf [ 1049.270815] ? setup_fault_attr+0x200/0x200 [ 1049.275144] ? lock_acquire+0x170/0x3c0 [ 1049.279128] __should_failslab+0x115/0x180 [ 1049.283376] should_failslab+0x5/0x10 [ 1049.287187] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1049.292302] __kmalloc_node+0x38/0x70 [ 1049.296114] kvmalloc_node+0x61/0xf0 [ 1049.299843] btf_new_fd+0x1c49/0x3800 [ 1049.303661] ? lock_acquire+0x170/0x3c0 [ 1049.307644] ? __might_fault+0xef/0x1d0 [ 1049.311628] ? btf_type_seq_show+0x180/0x180 [ 1049.316052] ? security_capable+0x8f/0xc0 [ 1049.320216] __se_sys_bpf+0x10c2/0x3a20 [ 1049.324205] ? check_preemption_disabled+0x41/0x280 [ 1049.329230] ? bpf_prog_load+0x1230/0x1230 [ 1049.333474] ? vfs_write+0x393/0x540 [ 1049.337193] ? fput+0x2b/0x190 [ 1049.340407] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1049.345781] ? trace_hardirqs_off_caller+0x6e/0x210 05:45:44 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 1049.350810] ? do_syscall_64+0x21/0x620 [ 1049.354801] do_syscall_64+0xf9/0x620 [ 1049.358618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.363811] RIP: 0033:0x7fc3b06a7109 [ 1049.367532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1049.386437] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1049.394150] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 05:45:44 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffff9c, 0x40106614, &(0x7f0000000000)) [ 1049.401428] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1049.408702] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.415982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1049.423264] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1049.439875] CPU: 0 PID: 20166 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 05:45:44 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 1049.447792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1049.457150] Call Trace: [ 1049.459751] dump_stack+0x1fc/0x2ef [ 1049.463390] should_fail.cold+0xa/0xf [ 1049.467204] ? setup_fault_attr+0x200/0x200 [ 1049.471528] ? lock_acquire+0x170/0x3c0 [ 1049.475598] __should_failslab+0x115/0x180 [ 1049.479843] should_failslab+0x5/0x10 [ 1049.483655] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1049.488861] __kmalloc_node+0x38/0x70 [ 1049.492681] kvmalloc_node+0x61/0xf0 [ 1049.496413] btf_new_fd+0x19cd/0x3800 [ 1049.500238] ? lock_acquire+0x170/0x3c0 [ 1049.504218] ? __might_fault+0xef/0x1d0 [ 1049.508202] ? btf_type_seq_show+0x180/0x180 [ 1049.512623] ? security_capable+0x8f/0xc0 [ 1049.516785] __se_sys_bpf+0x10c2/0x3a20 [ 1049.520773] ? check_preemption_disabled+0x41/0x280 [ 1049.525803] ? bpf_prog_load+0x1230/0x1230 [ 1049.530043] ? vfs_write+0x393/0x540 [ 1049.533764] ? fput+0x2b/0x190 [ 1049.536967] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1049.542340] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1049.547359] ? do_syscall_64+0x21/0x620 [ 1049.551347] do_syscall_64+0xf9/0x620 05:45:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 6) [ 1049.555162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.560352] RIP: 0033:0x7f52933a4109 [ 1049.564072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1049.582973] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1049.590690] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1049.597961] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 05:45:45 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffff9c, 0x40106614, &(0x7f0000000000)) [ 1049.605242] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1049.612516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1049.619792] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 05:45:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6}, 0x20) 05:45:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) [ 1049.737550] FAULT_INJECTION: forcing a failure. [ 1049.737550] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.759282] CPU: 0 PID: 20198 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1049.767202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1049.776556] Call Trace: [ 1049.779151] dump_stack+0x1fc/0x2ef [ 1049.782792] should_fail.cold+0xa/0xf [ 1049.786608] ? setup_fault_attr+0x200/0x200 [ 1049.790937] ? lock_acquire+0x170/0x3c0 [ 1049.794929] __should_failslab+0x115/0x180 [ 1049.799174] should_failslab+0x5/0x10 [ 1049.802979] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1049.808095] __kmalloc_node+0x38/0x70 [ 1049.811905] kvmalloc_node+0x61/0xf0 [ 1049.815629] btf_new_fd+0x1c6c/0x3800 [ 1049.819442] ? lock_acquire+0x170/0x3c0 [ 1049.823423] ? __might_fault+0xef/0x1d0 [ 1049.827406] ? btf_type_seq_show+0x180/0x180 [ 1049.831824] ? security_capable+0x8f/0xc0 [ 1049.835983] __se_sys_bpf+0x10c2/0x3a20 [ 1049.839961] ? check_preemption_disabled+0x41/0x280 [ 1049.844978] ? bpf_prog_load+0x1230/0x1230 [ 1049.849224] ? vfs_write+0x393/0x540 [ 1049.852941] ? fput+0x2b/0x190 [ 1049.856141] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1049.861506] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1049.866526] ? do_syscall_64+0x21/0x620 [ 1049.870509] do_syscall_64+0xf9/0x620 [ 1049.874319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1049.879509] RIP: 0033:0x7fc3b06a7109 [ 1049.883222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1049.902116] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1049.909805] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1049.917064] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1049.924322] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 05:45:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 5) 05:45:45 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 05:45:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6}, 0x20) 05:45:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26, 0x0, 0x3}, 0x20) 05:45:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x8000000000000001, 0x46000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x4}, 0x8) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 7) [ 1049.931573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1049.938823] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 05:45:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6}, 0x20) 05:45:45 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1050.041035] FAULT_INJECTION: forcing a failure. [ 1050.041035] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.074066] CPU: 0 PID: 20218 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1050.081981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:45:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) [ 1050.091337] Call Trace: [ 1050.093934] dump_stack+0x1fc/0x2ef [ 1050.097571] should_fail.cold+0xa/0xf [ 1050.101385] ? setup_fault_attr+0x200/0x200 [ 1050.105713] ? lock_acquire+0x170/0x3c0 [ 1050.109698] __should_failslab+0x115/0x180 [ 1050.113943] should_failslab+0x5/0x10 [ 1050.117033] FAULT_INJECTION: forcing a failure. [ 1050.117033] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.117745] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1050.117762] __kmalloc_node+0x38/0x70 [ 1050.117784] kvmalloc_node+0x61/0xf0 [ 1050.141537] btf_new_fd+0x1c49/0x3800 [ 1050.145354] ? lock_acquire+0x170/0x3c0 [ 1050.149336] ? __might_fault+0xef/0x1d0 [ 1050.153316] ? btf_type_seq_show+0x180/0x180 [ 1050.157735] ? security_capable+0x8f/0xc0 [ 1050.161895] __se_sys_bpf+0x10c2/0x3a20 [ 1050.165890] ? check_preemption_disabled+0x41/0x280 [ 1050.170908] ? bpf_prog_load+0x1230/0x1230 [ 1050.175149] ? vfs_write+0x393/0x540 [ 1050.178870] ? fput+0x2b/0x190 [ 1050.182072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 05:45:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) [ 1050.187445] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1050.192469] ? do_syscall_64+0x21/0x620 [ 1050.196453] do_syscall_64+0xf9/0x620 [ 1050.200263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.205456] RIP: 0033:0x7f52933a4109 [ 1050.209168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1050.228065] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 05:45:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x8000000000000001, 0x46000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x4}, 0x8) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) [ 1050.235773] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1050.243043] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1050.250311] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1050.257583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1050.264860] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 [ 1050.297236] CPU: 1 PID: 20226 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1050.305153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.314512] Call Trace: [ 1050.317109] dump_stack+0x1fc/0x2ef [ 1050.320746] should_fail.cold+0xa/0xf [ 1050.324563] ? setup_fault_attr+0x200/0x200 [ 1050.328902] ? lock_acquire+0x170/0x3c0 [ 1050.332890] __should_failslab+0x115/0x180 [ 1050.337135] should_failslab+0x5/0x10 [ 1050.340944] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1050.346057] __kmalloc_node+0x38/0x70 [ 1050.349867] kvmalloc_node+0x61/0xf0 [ 1050.353590] btf_new_fd+0x1c8f/0x3800 [ 1050.357399] ? lock_acquire+0x170/0x3c0 [ 1050.361379] ? __might_fault+0xef/0x1d0 [ 1050.365362] ? btf_type_seq_show+0x180/0x180 [ 1050.369788] ? security_capable+0x8f/0xc0 [ 1050.373948] __se_sys_bpf+0x10c2/0x3a20 [ 1050.377937] ? check_preemption_disabled+0x41/0x280 [ 1050.382970] ? bpf_prog_load+0x1230/0x1230 [ 1050.387216] ? vfs_write+0x393/0x540 [ 1050.390945] ? fput+0x2b/0x190 05:45:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async, rerun: 32) syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x0) (async, rerun: 32) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x8000000000000001, 0x46000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)={0x4}, 0x8) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 05:45:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 6) [ 1050.394153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1050.399527] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1050.404555] ? do_syscall_64+0x21/0x620 [ 1050.408548] do_syscall_64+0xf9/0x620 [ 1050.412361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.417556] RIP: 0033:0x7fc3b06a7109 [ 1050.421273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1050.440177] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 05:45:45 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 1050.447895] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1050.450998] FAULT_INJECTION: forcing a failure. [ 1050.450998] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.455175] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1050.455183] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1050.455190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1050.455199] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1050.563028] CPU: 0 PID: 20245 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1050.570948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.580306] Call Trace: [ 1050.582907] dump_stack+0x1fc/0x2ef [ 1050.586645] should_fail.cold+0xa/0xf [ 1050.590458] ? setup_fault_attr+0x200/0x200 [ 1050.594788] ? lock_acquire+0x170/0x3c0 [ 1050.598809] __should_failslab+0x115/0x180 [ 1050.603074] should_failslab+0x5/0x10 [ 1050.606886] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1050.612005] __kmalloc_node+0x38/0x70 [ 1050.615822] kvmalloc_node+0x61/0xf0 [ 1050.619541] btf_new_fd+0x1c6c/0x3800 [ 1050.623349] ? lock_acquire+0x170/0x3c0 [ 1050.627332] ? __might_fault+0xef/0x1d0 [ 1050.631317] ? btf_type_seq_show+0x180/0x180 [ 1050.635734] ? security_capable+0x8f/0xc0 [ 1050.639931] __se_sys_bpf+0x10c2/0x3a20 [ 1050.643920] ? check_preemption_disabled+0x41/0x280 [ 1050.648945] ? bpf_prog_load+0x1230/0x1230 [ 1050.653190] ? vfs_write+0x393/0x540 [ 1050.656907] ? fput+0x2b/0x190 [ 1050.660110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1050.665484] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1050.670505] ? do_syscall_64+0x21/0x620 [ 1050.674490] do_syscall_64+0xf9/0x620 [ 1050.678308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.683498] RIP: 0033:0x7f52933a4109 [ 1050.687216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1050.706123] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 05:45:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6}, 0x20) 05:45:46 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 05:45:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 8) 05:45:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) (fail_nth: 1) 05:45:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) (fail_nth: 1) 05:45:46 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) (fail_nth: 1) [ 1050.713844] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1050.721124] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1050.728399] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1050.735673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1050.742945] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 [ 1050.812989] FAULT_INJECTION: forcing a failure. [ 1050.812989] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.814378] FAULT_INJECTION: forcing a failure. [ 1050.814378] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.832849] FAULT_INJECTION: forcing a failure. [ 1050.832849] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.846890] CPU: 0 PID: 20269 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1050.854774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.864131] Call Trace: [ 1050.866729] dump_stack+0x1fc/0x2ef [ 1050.870382] should_fail.cold+0xa/0xf [ 1050.874194] ? setup_fault_attr+0x200/0x200 [ 1050.878516] ? is_bpf_text_address+0xfc/0x1b0 [ 1050.883014] ? kernel_text_address+0xbd/0xf0 [ 1050.887433] __should_failslab+0x115/0x180 [ 1050.891676] should_failslab+0x5/0x10 [ 1050.895490] kmem_cache_alloc+0x3f/0x370 [ 1050.899559] radix_tree_node_alloc.constprop.0+0x7c/0x320 [ 1050.905103] idr_get_free+0x50e/0xa10 [ 1050.908910] idr_alloc_u32+0x1a5/0x320 [ 1050.912791] ? __fprop_inc_percpu_max+0x210/0x210 [ 1050.917635] ? debug_check_no_obj_freed+0xb5/0x490 [ 1050.922560] ? trace_hardirqs_off+0x64/0x200 [ 1050.926964] idr_alloc_cyclic+0x102/0x230 [ 1050.931110] ? idr_alloc+0x130/0x130 [ 1050.934818] ? btf_new_fd+0x613/0x3800 [ 1050.938706] btf_new_fd+0x632/0x3800 [ 1050.942443] ? btf_type_seq_show+0x180/0x180 [ 1050.946844] ? security_capable+0x8f/0xc0 [ 1050.950985] __se_sys_bpf+0x10c2/0x3a20 [ 1050.954955] ? check_preemption_disabled+0x41/0x280 [ 1050.960068] ? bpf_prog_load+0x1230/0x1230 [ 1050.964293] ? vfs_write+0x393/0x540 [ 1050.968000] ? fput+0x2b/0x190 [ 1050.971185] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1050.976540] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1050.981550] ? do_syscall_64+0x21/0x620 [ 1050.985517] do_syscall_64+0xf9/0x620 [ 1050.989317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1050.994500] RIP: 0033:0x7fc3b06a7109 05:45:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000040)) [ 1050.998201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.017086] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1051.024783] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1051.032039] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1051.039295] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1051.046552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.053815] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1051.061093] CPU: 1 PID: 20270 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1051.068981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.078332] Call Trace: [ 1051.080917] dump_stack+0x1fc/0x2ef [ 1051.084550] should_fail.cold+0xa/0xf [ 1051.088353] ? setup_fault_attr+0x200/0x200 [ 1051.092673] ? lock_acquire+0x170/0x3c0 [ 1051.096647] __should_failslab+0x115/0x180 [ 1051.100876] should_failslab+0x5/0x10 [ 1051.104666] kmem_cache_alloc_trace+0x284/0x380 [ 1051.109324] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1051.114246] btf_new_fd+0x1d2/0x3800 [ 1051.117954] ? apparmor_sb_mount+0x970/0x970 [ 1051.122350] ? lock_downgrade+0x720/0x720 [ 1051.126490] ? lock_acquire+0x170/0x3c0 [ 1051.130461] ? __might_fault+0xef/0x1d0 [ 1051.134236] FAULT_INJECTION: forcing a failure. [ 1051.134236] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.134432] ? btf_type_seq_show+0x180/0x180 [ 1051.134448] ? security_capable+0x8f/0xc0 [ 1051.134465] __se_sys_bpf+0x10c2/0x3a20 [ 1051.134483] ? check_preemption_disabled+0x41/0x280 [ 1051.134496] ? bpf_prog_load+0x1230/0x1230 [ 1051.134511] ? vfs_write+0x393/0x540 [ 1051.134525] ? fput+0x2b/0x190 [ 1051.134544] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1051.134560] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1051.134574] ? do_syscall_64+0x21/0x620 [ 1051.134588] do_syscall_64+0xf9/0x620 [ 1051.134604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.134615] RIP: 0033:0x7f7579ae5109 [ 1051.134628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.134635] RSP: 002b:00007f757845a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1051.134648] RAX: ffffffffffffffda RBX: 00007f7579bf7f60 RCX: 00007f7579ae5109 [ 1051.134655] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000012 [ 1051.134662] RBP: 00007f757845a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1051.134669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.134676] R13: 00007fffe9c9598f R14: 00007f757845a300 R15: 0000000000022000 [ 1051.173853] CPU: 1 PID: 20268 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1051.273017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.282352] Call Trace: [ 1051.284936] dump_stack+0x1fc/0x2ef [ 1051.288555] should_fail.cold+0xa/0xf [ 1051.292343] ? setup_fault_attr+0x200/0x200 [ 1051.296649] ? lock_acquire+0x170/0x3c0 [ 1051.300614] __should_failslab+0x115/0x180 [ 1051.304836] should_failslab+0x5/0x10 [ 1051.308626] kmem_cache_alloc_trace+0x284/0x380 [ 1051.313279] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1051.318198] btf_new_fd+0x1d2/0x3800 [ 1051.321902] ? apparmor_sb_mount+0x970/0x970 [ 1051.326296] ? lock_downgrade+0x720/0x720 [ 1051.330427] ? lock_acquire+0x170/0x3c0 [ 1051.334512] ? __might_fault+0xef/0x1d0 [ 1051.338479] ? btf_type_seq_show+0x180/0x180 [ 1051.342879] ? security_capable+0x8f/0xc0 [ 1051.347024] __se_sys_bpf+0x10c2/0x3a20 [ 1051.350993] ? check_preemption_disabled+0x41/0x280 [ 1051.355999] ? bpf_prog_load+0x1230/0x1230 [ 1051.360223] ? vfs_write+0x393/0x540 [ 1051.364008] ? fput+0x2b/0x190 [ 1051.367192] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1051.372547] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1051.377549] ? do_syscall_64+0x21/0x620 [ 1051.381510] do_syscall_64+0xf9/0x620 [ 1051.385298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.390476] RIP: 0033:0x7faa5af91109 [ 1051.394186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.413083] RSP: 002b:00007faa59906168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1051.420789] RAX: ffffffffffffffda RBX: 00007faa5b0a3f60 RCX: 00007faa5af91109 [ 1051.428143] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1051.435412] RBP: 00007faa599061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1051.442672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.449939] R13: 00007ffe13c5c42f R14: 00007faa59906300 R15: 0000000000022000 [ 1051.457209] CPU: 0 PID: 20276 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1051.465238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.474590] Call Trace: [ 1051.477186] dump_stack+0x1fc/0x2ef [ 1051.480819] should_fail.cold+0xa/0xf [ 1051.484626] ? setup_fault_attr+0x200/0x200 [ 1051.488950] ? __lock_acquire+0x6de/0x3ff0 [ 1051.493187] ? mark_held_locks+0xf0/0xf0 [ 1051.497247] __should_failslab+0x115/0x180 [ 1051.501486] should_failslab+0x5/0x10 [ 1051.505286] __kmalloc+0x6d/0x3c0 [ 1051.508742] ? tty_buffer_alloc+0x23f/0x2a0 [ 1051.513074] tty_buffer_alloc+0x23f/0x2a0 [ 1051.517229] __tty_buffer_request_room+0x156/0x2a0 [ 1051.522162] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 1051.527700] ? do_raw_spin_lock+0xcb/0x220 [ 1051.531939] pty_write+0x126/0x1f0 [ 1051.535485] tty_send_xchar+0x28d/0x3b0 [ 1051.539460] ? tty_write_message+0x140/0x140 [ 1051.543867] ? _kstrtoull+0x297/0x540 [ 1051.547675] n_tty_ioctl_helper+0x18d/0x3a0 [ 1051.552008] n_tty_ioctl+0x56/0x360 [ 1051.555642] tty_ioctl+0x65d/0x1630 [ 1051.556875] FAULT_INJECTION: forcing a failure. [ 1051.556875] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.559269] ? n_tty_poll+0x8f0/0x8f0 [ 1051.559282] ? tty_fasync+0x300/0x300 [ 1051.559303] ? get_pid_task+0xf4/0x190 [ 1051.581895] ? mark_held_locks+0xf0/0xf0 [ 1051.585943] ? proc_fail_nth_write+0x95/0x1d0 [ 1051.590443] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1051.595374] ? __fdget_pos+0x26f/0x310 [ 1051.599279] ? ksys_write+0x241/0x2a0 [ 1051.603071] ? tty_fasync+0x300/0x300 [ 1051.606861] do_vfs_ioctl+0xcdb/0x12e0 [ 1051.610739] ? lock_downgrade+0x720/0x720 [ 1051.614877] ? check_preemption_disabled+0x41/0x280 [ 1051.619879] ? ioctl_preallocate+0x200/0x200 [ 1051.624273] ? __fget+0x356/0x510 [ 1051.627713] ? do_dup2+0x450/0x450 [ 1051.631234] ? vfs_write+0x393/0x540 [ 1051.634935] ? fput+0x2b/0x190 [ 1051.638113] ksys_ioctl+0x9b/0xc0 [ 1051.641552] __x64_sys_ioctl+0x6f/0xb0 [ 1051.645426] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1051.649993] do_syscall_64+0xf9/0x620 [ 1051.653786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.658961] RIP: 0033:0x7fb9052cf109 [ 1051.662664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.681547] RSP: 002b:00007fb903c23168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1051.689237] RAX: ffffffffffffffda RBX: 00007fb9053e2030 RCX: 00007fb9052cf109 [ 1051.696489] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1051.703740] RBP: 00007fb903c231d0 R08: 0000000000000000 R09: 0000000000000000 05:45:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 9) 05:45:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) (fail_nth: 2) [ 1051.710992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.718244] R13: 00007fff989cfa7f R14: 00007fb903c23300 R15: 0000000000022000 [ 1051.725512] CPU: 1 PID: 20283 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 1051.725515] [ 1051.725523] ====================================================== [ 1051.725527] WARNING: possible circular locking dependency detected [ 1051.725530] 4.19.211-syzkaller #0 Not tainted [ 1051.725534] ------------------------------------------------------ [ 1051.725538] syz-executor.1/20276 is trying to acquire lock: [ 1051.725541] 0000000050cb6e15 (console_owner){....}, at: vprintk_emit+0x3fe/0x740 [ 1051.725552] [ 1051.725556] but task is already holding lock: [ 1051.725559] 0000000002907143 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf4/0x1f0 [ 1051.725571] [ 1051.725575] which lock already depends on the new lock. [ 1051.725577] [ 1051.725579] [ 1051.725583] the existing dependency chain (in reverse order) is: [ 1051.725585] [ 1051.725587] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1051.725599] tty_port_tty_get+0x1d/0x80 [ 1051.725603] tty_port_default_wakeup+0x11/0x40 [ 1051.725607] serial8250_tx_chars+0x490/0xaf0 [ 1051.725611] serial8250_handle_irq.part.0+0x31f/0x3d0 [ 1051.725615] serial8250_default_handle_irq+0xae/0x220 [ 1051.725619] serial8250_interrupt+0x101/0x240 [ 1051.725623] __handle_irq_event_percpu+0x27e/0x8e0 [ 1051.725626] handle_irq_event+0x102/0x290 [ 1051.725630] handle_edge_irq+0x260/0xcf0 [ 1051.725633] handle_irq+0x35/0x50 [ 1051.725636] do_IRQ+0x93/0x1c0 [ 1051.725639] ret_from_intr+0x0/0x1e 05:45:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) (fail_nth: 7) 05:45:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) (fail_nth: 2) 05:45:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000040)) [ 1051.725642] _raw_spin_unlock_irqrestore+0xa3/0xe0 [ 1051.725646] uart_write+0x3bb/0x6f0 [ 1051.725649] do_output_char+0x5de/0x850 [ 1051.725658] n_tty_write+0x46e/0xff0 [ 1051.725662] tty_write+0x496/0x810 [ 1051.725665] redirected_tty_write+0xaa/0xb0 [ 1051.725669] do_iter_write+0x461/0x5d0 [ 1051.725672] vfs_writev+0x153/0x2e0 [ 1051.725675] do_writev+0x136/0x330 [ 1051.725678] do_syscall_64+0xf9/0x620 [ 1051.725683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.725684] [ 1051.725687] -> #1 (&port_lock_key){-.-.}: [ 1051.725699] serial8250_console_write+0x90e/0xb70 [ 1051.725702] console_unlock+0xbb6/0x1110 [ 1051.725706] vprintk_emit+0x2d1/0x740 [ 1051.725709] vprintk_func+0x79/0x180 [ 1051.725712] printk+0xba/0xed [ 1051.725716] register_console+0x87f/0xc90 [ 1051.725719] univ8250_console_init+0x3a/0x46 [ 1051.725722] console_init+0x4cb/0x718 [ 1051.725726] start_kernel+0x686/0x911 [ 1051.725729] secondary_startup_64+0xa4/0xb0 [ 1051.725731] [ 1051.725733] -> #0 (console_owner){....}: [ 1051.725744] vprintk_emit+0x43b/0x740 [ 1051.725748] vprintk_func+0x79/0x180 [ 1051.725751] printk+0xba/0xed [ 1051.725754] should_fail+0x66b/0x7b0 [ 1051.725758] __should_failslab+0x115/0x180 [ 1051.725761] should_failslab+0x5/0x10 [ 1051.725764] __kmalloc+0x6d/0x3c0 [ 1051.725768] tty_buffer_alloc+0x23f/0x2a0 [ 1051.725772] __tty_buffer_request_room+0x156/0x2a0 [ 1051.725776] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 1051.725779] pty_write+0x126/0x1f0 [ 1051.725782] tty_send_xchar+0x28d/0x3b0 [ 1051.725786] n_tty_ioctl_helper+0x18d/0x3a0 [ 1051.725789] n_tty_ioctl+0x56/0x360 [ 1051.725792] tty_ioctl+0x65d/0x1630 [ 1051.725796] do_vfs_ioctl+0xcdb/0x12e0 [ 1051.725799] ksys_ioctl+0x9b/0xc0 [ 1051.725802] __x64_sys_ioctl+0x6f/0xb0 [ 1051.725805] do_syscall_64+0xf9/0x620 [ 1051.725810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.725811] [ 1051.725815] other info that might help us debug this: [ 1051.725817] [ 1051.725820] Chain exists of: [ 1051.725822] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1051.725836] [ 1051.725840] Possible unsafe locking scenario: [ 1051.725842] [ 1051.725845] CPU0 CPU1 [ 1051.725849] ---- ---- [ 1051.725851] lock(&(&port->lock)->rlock); [ 1051.725859] lock(&port_lock_key); [ 1051.725867] lock(&(&port->lock)->rlock); [ 1051.725874] lock(console_owner); [ 1051.725880] [ 1051.725883] *** DEADLOCK *** [ 1051.725885] [ 1051.725888] 4 locks held by syz-executor.1/20276: [ 1051.725890] #0: 0000000023e4db3d (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 1051.725905] #1: 00000000dac78d3d (&tty->atomic_write_lock){+.+.}, at: tty_send_xchar+0x1d9/0x3b0 [ 1051.725919] #2: 00000000d59ab71e (&tty->termios_rwsem){++++}, at: tty_send_xchar+0x226/0x3b0 [ 1051.725933] #3: 0000000002907143 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf4/0x1f0 [ 1051.725947] [ 1051.725950] stack backtrace: [ 1051.725955] CPU: 0 PID: 20276 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 1051.725961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.725964] Call Trace: [ 1051.725967] dump_stack+0x1fc/0x2ef [ 1051.725971] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 1051.725975] __lock_acquire+0x30c9/0x3ff0 [ 1051.725978] ? mark_held_locks+0xf0/0xf0 [ 1051.725981] ? memcpy+0x35/0x50 [ 1051.725985] ? vprintk_emit+0x416/0x740 [ 1051.725988] lock_acquire+0x170/0x3c0 [ 1051.725991] ? vprintk_emit+0x3fe/0x740 [ 1051.725995] vprintk_emit+0x43b/0x740 [ 1051.725998] ? vprintk_emit+0x3fe/0x740 [ 1051.726001] vprintk_func+0x79/0x180 [ 1051.726004] printk+0xba/0xed [ 1051.726008] ? log_store.cold+0x16/0x16 [ 1051.726011] ? __lock_acquire+0x6de/0x3ff0 [ 1051.726015] ? ___ratelimit+0x319/0x590 [ 1051.726018] should_fail+0x66b/0x7b0 [ 1051.726021] ? setup_fault_attr+0x200/0x200 [ 1051.726025] ? __lock_acquire+0x6de/0x3ff0 [ 1051.726028] ? mark_held_locks+0xf0/0xf0 [ 1051.726032] __should_failslab+0x115/0x180 [ 1051.726035] should_failslab+0x5/0x10 [ 1051.726038] __kmalloc+0x6d/0x3c0 [ 1051.726041] ? tty_buffer_alloc+0x23f/0x2a0 [ 1051.726045] tty_buffer_alloc+0x23f/0x2a0 [ 1051.726049] __tty_buffer_request_room+0x156/0x2a0 [ 1051.726053] tty_insert_flip_string_fixed_flag+0x93/0x250 [ 1051.726057] ? do_raw_spin_lock+0xcb/0x220 [ 1051.726060] pty_write+0x126/0x1f0 [ 1051.726063] tty_send_xchar+0x28d/0x3b0 [ 1051.726067] ? tty_write_message+0x140/0x140 [ 1051.726070] ? _kstrtoull+0x297/0x540 [ 1051.726074] n_tty_ioctl_helper+0x18d/0x3a0 [ 1051.726077] n_tty_ioctl+0x56/0x360 [ 1051.726080] tty_ioctl+0x65d/0x1630 [ 1051.726083] ? n_tty_poll+0x8f0/0x8f0 [ 1051.726087] ? tty_fasync+0x300/0x300 [ 1051.726090] ? get_pid_task+0xf4/0x190 [ 1051.726093] ? mark_held_locks+0xf0/0xf0 [ 1051.726097] ? proc_fail_nth_write+0x95/0x1d0 [ 1051.726101] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 1051.726104] ? __fdget_pos+0x26f/0x310 [ 1051.726108] ? ksys_write+0x241/0x2a0 [ 1051.726111] ? tty_fasync+0x300/0x300 [ 1051.726114] do_vfs_ioctl+0xcdb/0x12e0 [ 1051.726117] ? lock_downgrade+0x720/0x720 [ 1051.726121] ? check_preemption_disabled+0x41/0x280 [ 1051.726125] ? ioctl_preallocate+0x200/0x200 [ 1051.726128] ? __fget+0x356/0x510 [ 1051.726131] ? do_dup2+0x450/0x450 [ 1051.726134] ? vfs_write+0x393/0x540 [ 1051.726138] ? fput+0x2b/0x190 [ 1051.726141] ksys_ioctl+0x9b/0xc0 [ 1051.726144] __x64_sys_ioctl+0x6f/0xb0 [ 1051.726148] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1051.726151] do_syscall_64+0xf9/0x620 [ 1051.726155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1051.726158] RIP: 0033:0x7fb9052cf109 [ 1051.726169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1051.726172] RSP: 002b:00007fb903c23168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1051.726180] RAX: ffffffffffffffda RBX: 00007fb9053e2030 RCX: 00007fb9052cf109 [ 1051.726186] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 1051.726191] RBP: 00007fb903c231d0 R08: 0000000000000000 R09: 0000000000000000 [ 1051.726196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.726200] R13: 00007fff989cfa7f R14: 00007fb903c23300 R15: 0000000000022000 [ 1051.745063] FAULT_INJECTION: forcing a failure. [ 1051.745063] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.747695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.747699] Call Trace: [ 1051.747718] dump_stack+0x1fc/0x2ef [ 1051.747736] should_fail.cold+0xa/0xf [ 1052.056096] FAULT_INJECTION: forcing a failure. [ 1052.056096] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.061588] ? setup_fault_attr+0x200/0x200 [ 1052.061602] ? is_bpf_text_address+0xfc/0x1b0 [ 1052.061615] ? kernel_text_address+0xbd/0xf0 [ 1052.061628] __should_failslab+0x115/0x180 [ 1052.061644] should_failslab+0x5/0x10 [ 1052.061656] kmem_cache_alloc+0x3f/0x370 [ 1052.061672] radix_tree_node_alloc.constprop.0+0x7c/0x320 [ 1052.129375] FAULT_INJECTION: forcing a failure. [ 1052.129375] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.137103] idr_get_free+0x50e/0xa10 [ 1052.137130] idr_alloc_u32+0x1a5/0x320 [ 1052.137148] ? __fprop_inc_percpu_max+0x210/0x210 [ 1052.137161] ? debug_check_no_obj_freed+0xb5/0x490 [ 1052.137178] ? trace_hardirqs_off+0x64/0x200 [ 1052.137195] idr_alloc_cyclic+0x102/0x230 [ 1052.588301] ? idr_alloc+0x130/0x130 [ 1052.592000] ? btf_new_fd+0x613/0x3800 [ 1052.595876] btf_new_fd+0x632/0x3800 [ 1052.599581] ? btf_type_seq_show+0x180/0x180 [ 1052.603976] ? security_capable+0x8f/0xc0 [ 1052.608111] __se_sys_bpf+0x10c2/0x3a20 [ 1052.612069] ? check_preemption_disabled+0x41/0x280 [ 1052.617074] ? check_preemption_disabled+0x41/0x280 [ 1052.622091] ? bpf_prog_load+0x1230/0x1230 [ 1052.626316] ? vfs_write+0x393/0x540 [ 1052.630015] ? fput+0x2b/0x190 [ 1052.633199] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1052.638637] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1052.643650] do_syscall_64+0xf9/0x620 [ 1052.647524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.652694] RIP: 0033:0x7fc3b06a7109 [ 1052.656479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1052.675360] RSP: 002b:00007fc3af01c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1052.683049] RAX: ffffffffffffffda RBX: 00007fc3b07b9f60 RCX: 00007fc3b06a7109 [ 1052.690306] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1052.697571] RBP: 00007fc3af01c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1052.704823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1052.712078] R13: 00007fff7d035e3f R14: 00007fc3af01c300 R15: 0000000000022000 [ 1052.722198] CPU: 1 PID: 20284 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 1052.730086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.739425] Call Trace: [ 1052.742003] dump_stack+0x1fc/0x2ef [ 1052.745620] should_fail.cold+0xa/0xf [ 1052.749407] ? setup_fault_attr+0x200/0x200 [ 1052.753715] ? lock_acquire+0x170/0x3c0 [ 1052.757677] ? lock_downgrade+0x720/0x720 [ 1052.761809] __should_failslab+0x115/0x180 [ 1052.766051] should_failslab+0x5/0x10 [ 1052.769838] kmem_cache_alloc_trace+0x284/0x380 [ 1052.774494] btf_new_fd+0x41c/0x3800 [ 1052.778197] ? apparmor_sb_mount+0x970/0x970 [ 1052.782589] ? lock_downgrade+0x720/0x720 [ 1052.786718] ? lock_acquire+0x170/0x3c0 [ 1052.790677] ? __might_fault+0xef/0x1d0 [ 1052.794635] ? btf_type_seq_show+0x180/0x180 [ 1052.799027] ? security_capable+0x8f/0xc0 [ 1052.803159] __se_sys_bpf+0x10c2/0x3a20 [ 1052.807119] ? check_preemption_disabled+0x41/0x280 [ 1052.812118] ? check_preemption_disabled+0x41/0x280 [ 1052.817115] ? bpf_prog_load+0x1230/0x1230 [ 1052.821341] ? vfs_write+0x393/0x540 [ 1052.825049] ? fput+0x2b/0x190 [ 1052.828240] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1052.833589] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1052.838593] do_syscall_64+0xf9/0x620 [ 1052.842383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1052.847557] RIP: 0033:0x7f7579ae5109 [ 1052.851252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1052.870135] RSP: 002b:00007f757845a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1052.877825] RAX: ffffffffffffffda RBX: 00007f7579bf7f60 RCX: 00007f7579ae5109 [ 1052.885077] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000012 [ 1052.892329] RBP: 00007f757845a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1052.899581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1052.906830] R13: 00007fffe9c9598f R14: 00007f757845a300 R15: 0000000000022000 05:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1052.925175] CPU: 1 PID: 20295 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 1052.933077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.942422] Call Trace: [ 1052.945012] dump_stack+0x1fc/0x2ef [ 1052.948655] should_fail.cold+0xa/0xf [ 1052.952456] ? setup_fault_attr+0x200/0x200 [ 1052.956773] ? lock_acquire+0x170/0x3c0 [ 1052.960744] ? lock_downgrade+0x720/0x720 [ 1052.964890] __should_failslab+0x115/0x180 [ 1052.969122] should_failslab+0x5/0x10 05:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1052.972927] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1052.978034] __kmalloc_node+0x38/0x70 [ 1052.981846] kvmalloc_node+0x61/0xf0 [ 1052.985563] btf_new_fd+0x1c8f/0x3800 [ 1052.989366] ? lock_acquire+0x170/0x3c0 [ 1052.993347] ? __might_fault+0xef/0x1d0 [ 1052.997320] ? btf_type_seq_show+0x180/0x180 [ 1053.001726] ? security_capable+0x8f/0xc0 [ 1053.005878] __se_sys_bpf+0x10c2/0x3a20 [ 1053.009853] ? check_preemption_disabled+0x41/0x280 [ 1053.014870] ? check_preemption_disabled+0x41/0x280 [ 1053.019880] ? bpf_prog_load+0x1230/0x1230 [ 1053.024113] ? vfs_write+0x393/0x540 [ 1053.027826] ? fput+0x2b/0x190 [ 1053.031022] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1053.036391] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1053.041406] do_syscall_64+0xf9/0x620 [ 1053.045209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.050382] RIP: 0033:0x7f52933a4109 [ 1053.054080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1053.072970] RSP: 002b:00007f5291d19168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1053.080672] RAX: ffffffffffffffda RBX: 00007f52934b6f60 RCX: 00007f52933a4109 [ 1053.088019] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1053.095287] RBP: 00007f5291d191d0 R08: 0000000000000000 R09: 0000000000000000 [ 1053.102552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1053.109820] R13: 00007fff7c1fdb6f R14: 00007f5291d19300 R15: 0000000000022000 [ 1053.117093] CPU: 0 PID: 20297 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 1053.124979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.134327] Call Trace: [ 1053.136920] dump_stack+0x1fc/0x2ef [ 1053.140556] should_fail.cold+0xa/0xf [ 1053.144365] ? setup_fault_attr+0x200/0x200 [ 1053.148691] ? lock_acquire+0x170/0x3c0 [ 1053.152674] ? lock_downgrade+0x720/0x720 [ 1053.156833] __should_failslab+0x115/0x180 [ 1053.161076] should_failslab+0x5/0x10 [ 1053.164882] kmem_cache_alloc_trace+0x284/0x380 [ 1053.169557] btf_new_fd+0x41c/0x3800 [ 1053.173275] ? apparmor_sb_mount+0x970/0x970 [ 1053.177682] ? lock_downgrade+0x720/0x720 [ 1053.181832] ? lock_acquire+0x170/0x3c0 [ 1053.185804] ? __might_fault+0xef/0x1d0 [ 1053.189782] ? btf_type_seq_show+0x180/0x180 [ 1053.194192] ? security_capable+0x8f/0xc0 [ 1053.198344] __se_sys_bpf+0x10c2/0x3a20 [ 1053.202409] ? check_preemption_disabled+0x41/0x280 [ 1053.207450] ? check_preemption_disabled+0x41/0x280 [ 1053.212469] ? bpf_prog_load+0x1230/0x1230 [ 1053.216706] ? vfs_write+0x393/0x540 [ 1053.220423] ? fput+0x2b/0x190 [ 1053.223625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1053.229000] ? trace_hardirqs_off_caller+0x6e/0x210 [ 1053.234023] do_syscall_64+0xf9/0x620 [ 1053.237831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1053.243021] RIP: 0033:0x7faa5af91109 [ 1053.246733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1053.265630] RSP: 002b:00007faa59906168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 05:45:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000040)) 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 05:45:48 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x2, 0x3) 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5409, 0x3) 05:45:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:48 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0xc042) 05:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) [ 1053.273342] RAX: ffffffffffffffda RBX: 00007faa5b0a3f60 RCX: 00007faa5af91109 [ 1053.280616] RDX: 0000000000000020 RSI: 0000000020000680 RDI: 0000000000000012 [ 1053.287885] RBP: 00007faa599061d0 R08: 0000000000000000 R09: 0000000000000000 [ 1053.295155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1053.302424] R13: 00007ffe13c5c42f R14: 00007faa59906300 R15: 0000000000022000 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x3) 05:45:48 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540c, 0x3) 05:45:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0xc042) 05:45:48 executing program 4: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:48 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0xc042) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0xc042) (async) 05:45:48 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:48 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:48 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:48 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540d, 0x3) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540e, 0x3) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001080), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x9, 0x4, 0xfffffffb, 0x40, 0x1, 0x45, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x9}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0), 0x8) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000440), 0xc) write$UHID_INPUT(r3, &(0x7f00000012c0)={0x8, {"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", 0x1000}}, 0x1006) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xb, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x64}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x3, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f00000010c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001100)={0x0, 0xc, 0x7ff, 0x10000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[r1, 0x1, r2, r4]}, 0x80) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0x3) 05:45:49 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001080), 0x8) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x9, 0x4, 0xfffffffb, 0x40, 0x1, 0x45, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x9}, 0x48) (async, rerun: 32) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0), 0x8) (async, rerun: 32) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x802, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000440), 0xc) write$UHID_INPUT(r3, &(0x7f00000012c0)={0x8, {"83c0cf672d5baeeb4baa45e451ce232b24c8698e1a6dc4d60454ee1837b70e10dbcf3775b69d07258be1cce86bc41fe59ac2e6f3d7be4760d45b8ba1db7c6188946c3533dafd3210a751415bb1c73fa458716bdf8e1995211ca93e71a74379f84546920b0813fa0b7caacfaeaacfc3cb29b88beee5b3e90458c6d75d1c0550e55918a89d8e841de6f4c78fa3dbff64517713aa5399e15557ac1eb784a32f314cfd0c9b4c853ffed69469328186197a1085d8a46d3f0a4134e0709f49201838ddba64d9359b5899190d5155ea5a38bace07bdc071e97bc3de15f8483e9f88d0fe24fb0c7592475a4f08a41234e2faf4ab4cfa50ac4035068d286afddbff679db5eca98ae5ad705cc52d1599d2e4e503c890e805a45e9c986c37a2927605a95da82268e592d22faaaa3ef595e01e6863c2e02a78a76c050b4c7421998887897e4bcb982e2a8a749629f3571de0180221a554ef203f23c00c46c76cbb05bc9d21e2515bd956a3c7f6701798a80c928ae87f5828986341d2efd0e46a2f5904c7caa8fc3f9d6f8bd1766e173ca039e2a9f1ae2c76fc4b5226da651f7a1caf80dffa38c900b3cf2437b4b289adaa1eb45f0ba791651e00daa44f0180976bc506b642b3b26fe5f3a72a0ccf7ef9ddfccdfa95495ddf1ee4db0ff86b73831234a5ef1006583ca715c0e39a30db84d7781db197aa0877e45369dabd8ccd09cc5002e7d36097a0e2254511d85f8be3369e7ac3fad44013b8b757aea413a77b43859c9c2b0fdf0080ae087c5e3cd3c7fd8f388f6a262817b820ad92210f69ad95f62c09bc12b68ea431ea367042adc89f169e39add5aac4d66b5ce3b511326adf1071217da46623564e9ad1ac57f10d500cd4dfc946aabbe9f4c3679efac405b0dfc3a09bc34e909e4f0149f87bb1b1539a1e23ad656ae332742ed2324bcaa2de7cb54331851a61aad748853682b660d6ce77bf8353a935df42e9ba58d05cc81e52622e5851ed24702713d5afcbab50461695c9826b6b3e5ecba6902f64965556fa021ee0ee61067cac68f9f6ec320226ee330a40881a039040f6163b474f92087ba84efd94b6a3c46a9267b151f5008b536a7cf759393b0d222f8646b9d02a2d57b7b3a0b5391a48540ff0c7b164fc669ebe576b32cda0716a2acb5a74351b059d17088e8e22358d4a6707e129b47ce178f121b4080d063be566f0c398adaba39f7e3cef9a7e34aa84dbb9a8e327cb3cc3f675ea0d8d6bc7b5ea333ee3fa838455b53188ebaf904ebb236e12ddf059e5ce4727637beec6370a550c956c9c4b3ada249c6e79fd990dbde9c4fc26a3e883f67ed7e986743aa0cd9855ccfeee7165926b99a1d5ae838b8209df2a6f6804d4b0dc4aadb0798688b2f903a59436dbaa4bdd5f727fab09ade99d1dff46a1368f38a3f3cd0c645e51ced3435e15674fb2a6ce2e420a89cdd2b478aac8c5f4f9b1bcdbb4f58ff9d5a39e0ee26931e961c59209ac2faac81e2fb54c3c56c4b2ae27fb514cfdfd9557fe2464085c3a3577310c8dce5dc46f74b5324ec4fc36f80d93234faeb396060788f6252493af3380cce460c5814ca8ef2b80f63e504f7ce34a1e6279112fad37eb013280cc505e6a50d9602184ca0e0e19d031497011aaf712bce52058b00268b0fb4d457e7b8a865012d70439190a92f72241c54f43353c62d913d271183dd40469a09ed62e9082f8f417fc7b4fa9cb893b9f44acbd0c3f7e3a7235e04c9098774feaa8daee7519e39751770efc4118d589fcf27e56468976c86e8ac4dd62dd7ddbbccf68c9e97fb3457cd579e76d0f359a5409c514763e1d2a665281ec3f6910bc6ed07b248d134b14eb3305e3b36afcb774bead15822f775b5c8b189be827ead5457ba0ec1a09a82a1a313b5e031103671d5af58e3d5b666517ce5778c7ffb5ac48890b4bc901883c724d43693acb721b5dd67689afbfd33761571eba87b6115b073df8207aaa3a01d2032f4a49f68bfbf2fa32314dc5080e30cb54526a7f78449c8cbea52cb0952ac573af7ae590b318022f6f32f76cff42338c0d462045785e13055efcefd8dbe016026df04de759e0224982fdf9cd46ee69020a09bb7180746fdd27a7409095336bfa2090dcde549bbefc85cb485be72bbfb4f2fdc379232b95925f1aa180639a65dd04c2766f9b679fb8f50bb16c75321c655bee220edcceef2008b486dcd088c30727306fcbeb199c9940e42862c3275f99e47f6a3c1df5bb1952e3f02d7a55bace0ac3a4951087f245c24123a9424c1de73da0bd55e0d6aa7b705cdeef02349359d9e0459ab42d57104e00447abe63f068dc3d3fde6a80fdc6085feb7551dce39102e7d9b66c5e975d01aacfa2a58b4ecf01c4a1481af0044e3567a87ed196dd8e8fc3c61fb2c60898c2b6b2c0d3e4d97809b5826d86d83d96dea2b2c4505f07b5d8b6364cc66e9c6354dbe039f73e5a27321b2839e98c61ee99e1684aa6a610eecc1818d541b2bde0efd29e534d7a54c3ab23f88cdaa2e03c780f52996ebf2ff8cefc90ba9b64f0e5d69456035a776dd7f641977bd93b0676e6868eaa618d2e98b505b9ab4a7b129cdd14f4041643bda453b8c8e71bd6c27787b6fd0cfa159f6d95259740c519e8396f986c66f5e9e07eab6ca12271cd565a0fabc1d6efbe2197ceabaff2ef34e07090e69afb19688615461949555623fed235dc13908fa996f64b90a73b95de3fabdb8b8f62d0ad68fc2cea0ec38cb2d938491bb477ccc0bd8a2e04d6a5af374af9dd72c30ee4e865340657c37cccfa5014e48bb83bfd45311ce24380f489e4afb31f8d6285fbb1b62570606c48a7cdab9584cf851a3bc94189717c11b434db869320e7a67158d772644036989019dd3e7c851c82347e12ee033e90b3aba5dcd14f6e6f7b51dba14b3c3fee420818ae694ee1c56d32e4707adbc74429f05bfc848873e053d499ca8f39a270763a1fba593a431ea48938813dde342f971d83d9d34743d012e437b9ca916a589eba6b5bac47541119d0015bc7e44122dc3c8a11854c66c01836090b237d85f1ba8cc1de55e82516c26b83dd70ae46b6e4356ff3bc3fb75e3ed7b8ee427a75b6ccc43151f7928eccb809b88a7c72bfd1801f4b7ff79c7a6dc5f6c3eaa7fa2aeb5ab67b59b3ba55bb62c54378423e154cf178a9230b9f142906769eedad0e5a2121ea7586abb8130a03b362df43b80c4917d8a73f2bad3f53712ba68998424d12c52ca4382abcfbc86678083666022807564a572276013338dd5618578bf8b8c0fe3a84e273b0f22134ccb0e25624f2763a0877b512bd29c1fe64713e97adf6f07d127cbceb1e69dc2afa7ba9b85b52ba46b8ecdd9a490ce272f2048c45e8022dbc71bf63164b57956980a367b2988efa133a1e5b4082dcab1573476f32be25d89db67890876cd2f46b79c338a4d9823f9c0408d37b33fd191bd9ae4182c3670e9e000c326b44f5b46a38ec575cd7a00cf692de198a662afb32aef3980927df61f4f1eda1d906483b43b4b4e58176a6dadd4aeb5cca43a1f0b67c2ec98d89585fa2489ca8f6407b27b9961f35e3f99f015cb7c8b4318643a26dd361cbdb6fa31b0da38b807775c9f4cb3deb6314c64723b77464ef32082ebed74a606d6a6d59ec832245a8365a8deb74da9c4a746d3b39b4871e3396923d54a72f7e6708c6855fbfe2d6224b978dafdc392eb3c8092908a5b1ee03500b06104d82d1ee0ef992ea4b5f952a5920658f16f005f28f8379b5d8614e90b385bbd2e64521efa3f187d1032ce987aa224749defae4c14af9024fc8f8b2fd18fb4c26c904445271464af979bcbf620dbe52a2a2535aec20b6f3ff2b21dadf79ae150799a1f2b7e9c7303ec762ee8a61df7844cc3409ba7c4a49bc9e7e0272ee40c760714cc0d863076760669e294145ef5a635b3a5a9e78d33f3d94123b59e7ad9ebafe718462b059af6cc68e08c046c053fcac255edd3e9b41243a5822821df1e28eea8e27925e3eb2a2da33ce17a987c391841ac2a3ac80ba4b642c4650474b83936112c74958ce8e5d24290ec9eba99d4108090ec12015109c38662101d08aeafeda82c3c7f5161cee3449ea18bf4cd36c8855b838f03600e835a2810b2c8c5842e52e4790ea484377f05c43c140a6a6ef9f972878149668c1d97ae2fb45d4e445ae4f397c6e40ea7f6145b59d1b82d7762044aefdaec30090b1659a59ab1aa0c494a7e0a0d522e4af70ea85f02bd0437f873d09a44f77c24379e6be2e0c3d8a8db813a33b78a223e673160f8adfc13432da348564b1e64604656e72a4744208753c0a7cdc62dfe2de3da044a69ddc6209f3ebc8e13a5066a6fea4a7932671bc85aa9fbe67041efd361627fafc88652c26439e73a90804188fecc690985b4a777a0eb3e4502c04df5c9301d53c91c3723c2a8148ab43f8d0eb15edde3f502f4c0b1469d4ea31c4301e40c3e79877997eb53cc6e6d78e3d3ad36399381c20ee0babb6e8c323a54a23830b7b4ab866b978cd1c8179bcfd2681f8ff0e90d9547efb4d1e1dff303f99f627a3af9d2d93d283c07fdd02018598488f31504805a8219324f9f133bcf640ae4bf04790f37911a9b6b4999a6f234ed8bc11bf7b3875e6a32ac4a92dac96d748c56f626d6851548768879cd5ee357bf1ecdf251328852ce7fe371f87f6aafbdfc0c024d08062c6e4abc997f69c9355de0eff1780be55b3e4fbabe5a2b1a86a8e2d08ec2f09729fb588bab45a3ab24edb9bb5199ae93d4fc69d730376d6b070647f2e1507d587b5aed3b568515c236b42736fcf5abcea2f7e71aeaee3f804f36496791ead2400a32bf8317246138672e86b7763460489592869446459441640e0140731b0e2a4e47f8fc5798c70a45f9587b052cb9203e94dd9e0e4cbd28a8c84a6210dd87c83f2bf03562dde204550352e8dc5b16db87ed15e4343a4f817a1877dd91c6807527c8e1b7ab22923f2f728e4ee7152bc80d2538fe5fc2a84b767c5c8195481bbde1cd642c2ed214143fe98223f525eb33d359a36b8c018442e20fa533194c32faa5ca30743e51d35baab8c91265a7d7b9a038a7952a937cbbf77044ff98408ab8f98326c39b489f2296aae0813c71b3c46fd2d6d9c5df0d3ddd5354eb1c4a37aaa7282a1d2f86828bcf774caeda1b97b188f2aebdd3245b33b064a7f14b476f8994c38715d778f1e486a9a633b21b1d496bc29d698efda4b3183a9ff937260ce6ab67f6c07b80d62492fd0ccdb97c90b2d1c5e8e42aac9b87583bc2889858e5c557626775b28900fca5b789993ff4d28abcffdd46d2b180fe4766e76f2745d280737340d252a1a32365175ea16113989f65d2745043dd6cf6d157a345f392ab876f89f70115eb828ab395fc5d7aa2ed63ada69f460c11d61da39253cd2dc7ff186c0f61913bbc29edd77af2ca3799a6c513e819cf976a1137568f77cd8b64ef78d44b93f13ec185b199734160f74bd7e9232c3f715666120c9722f1e6a812f6d90ce66b50a714b264ecfc11574c5ec29a69270b9c15aee12249cb835eebe211c41fd3af483d4ced8081a1449979572cbab7e48e357ff293888d798a3506b2a24734c44e38bf22a8c9a0c1e5e182e5b9d1e3053f2707e8fbed2adaeffe2e26d50c0dcf014f69406ec24b7f72bf8e341798cd3e8d4263f2094032ef1f2b740244dcbd6c82e46b43e9e82cde1e6d93879e78230a078717e6e317316667d1bc7f4dd6d76ecedbe90ad7a2e039d2a862bcb2da2c4d27f55dd3043b42fdf81d2af26b2c8f9ddc0223ee163b11068b3", 0x1000}}, 0x1006) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xb, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x64}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x3, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f00000010c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001100)={0x0, 0xc, 0x7ff, 0x10000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[r1, 0x1, r2, r4]}, 0x80) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5410, 0x3) 05:45:49 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000001080), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@bloom_filter={0x1e, 0x9, 0x4, 0xfffffffb, 0x40, 0x1, 0x45, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x9}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000011c0), 0x8) (async, rerun: 64) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x802, 0x0) (rerun: 64) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000440), 0xc) (async) write$UHID_INPUT(r3, &(0x7f00000012c0)={0x8, {"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", 0x1000}}, 0x1006) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xb, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x64}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000080)=""/4096, 0x40f00, 0x3, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f00000010c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001100)={0x0, 0xc, 0x7ff, 0x10000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[r1, 0x1, r2, r4]}, 0x80) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5411, 0x3) 05:45:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/fib_trie\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x490100) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5412, 0x3) 05:45:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/fib_trie\x00') (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x490100) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5413, 0x3) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/fib_trie\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x490100) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/fib_trie\x00') (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) (async) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000140)) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x490100) (async) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) (async) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) (async) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x3) 05:45:49 executing program 3: ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8000000000000000, &(0x7f0000000040)={0x27, 0x69, 0x70}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 3: ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8000000000000000, &(0x7f0000000040)={0x27, 0x69, 0x70}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8000000000000000, &(0x7f0000000040)={0x27, 0x69, 0x70}) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5415, 0x3) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 3: ptrace$setsig(0x4203, 0xffffffffffffffff, 0x8000000000000000, &(0x7f0000000040)={0x27, 0x69, 0x70}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x3) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:49 executing program 4: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:49 executing program 3: r0 = gettid() ptrace$getenv(0x4201, 0x0, 0x21a6, &(0x7f0000000000)) syz_open_procfs(r0, &(0x7f0000000080)='net/llc/socket\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) syz_open_pts(r1, 0xae581) 05:45:49 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:49 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5418, 0x3) 05:45:49 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: r0 = gettid() ptrace$getenv(0x4201, 0x0, 0x21a6, &(0x7f0000000000)) (async) syz_open_procfs(r0, &(0x7f0000000080)='net/llc/socket\x00') (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) syz_open_pts(r1, 0xae581) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x541b, 0x3) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 3: r0 = gettid() ptrace$getenv(0x4201, 0x0, 0x21a6, &(0x7f0000000000)) syz_open_procfs(r0, &(0x7f0000000080)='net/llc/socket\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) syz_open_pts(r1, 0xae581) gettid() (async) ptrace$getenv(0x4201, 0x0, 0x21a6, &(0x7f0000000000)) (async) syz_open_procfs(r0, &(0x7f0000000080)='net/llc/socket\x00') (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) syz_open_pts(r1, 0xae581) (async) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x541d, 0x3) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r9 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r8, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r7, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r5, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r8, 0xffffffffffffffff, r9, r10]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="aaedbc91", @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7800028074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000044000400ac0006801f0000000700023f060000000200470663a800003fed0705fb02000000804afa000200000400f82a030000000400080200000000060042400000000008000100", @ANYRES32=0x0, @ANYBLOB="b400028040001100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000008000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000008000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="100102805c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c000400ffff03fd0200000008006f20ffffffff030001fe00000000060011ff04000000f8ff00081f00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004008af3000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006222000008000100", @ANYRES32=r6, @ANYBLOB="c80002804c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c00040007001f09020000000101402003000000efdf09200000010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004006b3d000008000100", @ANYRES32=0x0, @ANYBLOB="f00002806c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c000400ff033f0001000000e40c8108a30c000002008e95080000003f000500010400007f0005ff090000000180e10806000000090084049800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400008000000800070000000000"], 0x618}}, 0x4000084) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x3) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x7ffff, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r9 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r8, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r7, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r5, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r8, 0xffffffffffffffff, r9, r10]}, 0x80) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="aaedbc91", @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7800028074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000044000400ac0006801f0000000700023f060000000200470663a800003fed0705fb02000000804afa000200000400f82a030000000400080200000000060042400000000008000100", @ANYRES32=0x0, @ANYBLOB="b400028040001100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000008000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000008000008000100", @ANYRES32=0x0, @ANYBLOB="9c0102806c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c000400070000930900000003000003fdffffffa9091c0282ae000004000908000000001805427f04000000000106ff05000000ec390192090000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000000c000400ff033f090100010038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000900000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="100102805c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c000400ffff03fd0200000008006f20ffffffff030001fe00000000060011ff04000000f8ff00081f00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004008af3000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006222000008000100", @ANYRES32=r6, @ANYBLOB="c80002804c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c00040007001f09020000000101402003000000efdf09200000010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004006b3d000008000100", @ANYRES32=0x0, @ANYBLOB="f00002806c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c000400ff033f0001000000e40c8108a30c000002008e95080000003f000500010400007f0005ff090000000180e10806000000090084049800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400008000000800070000000000"], 0x618}}, 0x4000084) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5420, 0x3) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5421, 0x3) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r7 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r9 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r8, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r7, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r5, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r8, 0xffffffffffffffff, r9, r10]}, 0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="aaedbc91", @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7800028074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000044000400ac0006801f0000000700023f060000000200470663a800003fed0705fb02000000804afa000200000400f82a030000000400080200000000060042400000000008000100", @ANYRES32=0x0, @ANYBLOB="b400028040001100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000008000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000008000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="100102805c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c000400ffff03fd0200000008006f20ffffffff030001fe00000000060011ff04000000f8ff00081f00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004008af3000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006222000008000100", @ANYRES32=r6, @ANYBLOB="c80002804c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c00040007001f09020000000101402003000000efdf09200000010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004006b3d000008000100", @ANYRES32=0x0, @ANYBLOB="f00002806c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c000400ff033f0001000000e40c8108a30c000002008e95080000003f000500010400007f0005ff090000000180e10806000000090084049800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400008000000800070000000000"], 0x618}}, 0x4000084) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(0xffffffffffffffff, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x10, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r7) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r8, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(r7, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r5, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r8, 0xffffffffffffffff, r9, r10]}, 0x80) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="aaedbc91", @ANYRES16=0x0, @ANYBLOB="00032cbd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7800028074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000044000400ac0006801f0000000700023f060000000200470663a800003fed0705fb02000000804afa000200000400f82a030000000400080200000000060042400000000008000100", @ANYRES32=0x0, @ANYBLOB="b400028040001100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000008000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000008000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000700000000003c000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005e7ffff0a00040072616e646f6d00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600fef5cc52e700c1cdf14536daa7d5ed6018ceaa8e39ff69a7293961e881ae81859c8331cea72819e4588f8c351261ae9155577bf6d4ea7746c13722aba2d82d1c68941e6f3242b9b41b3b33a3eb7af544402fd775fb54c3ec29452a3ed4a661cbb896b321c909cdd2fb2ea578455ab71ae17003c8f923769959dc05c34907f1966a5013a29b3ec27726084a767feb1aec5a97375df3f15bd4b38cfd07e977d0b7f59dd74e8a397e9dbf50d7a31a5ea08674494e04d84bcfd7", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="100102805c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c000400ffff03fd0200000008006f20ffffffff030001fe00000000060011ff04000000f8ff00081f00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004008af3000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006222000008000100", @ANYRES32=r6, @ANYBLOB="c80002804c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c00040007001f09020000000101402003000000efdf09200000010040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004006b3d000008000100", @ANYRES32=0x0, @ANYBLOB="f00002806c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c000400ff033f0001000000e40c8108a30c000002008e95080000003f000500010400007f0005ff090000000180e10806000000090084049800000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400008000000800070000000000"], 0x618}}, 0x4000084) (async) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5422, 0x3) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 3: bpf$BPF_GET_PROG_INFO(0x14, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x3, 0x2, 0xb4, 0x1, 0xf, "53f339a92a8a1b46"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5423, 0x3) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: bpf$BPF_GET_PROG_INFO(0x14, 0x0, 0x0) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x3, 0x2, 0xb4, 0x1, 0xf, "53f339a92a8a1b46"}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5424, 0x3) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: bpf$BPF_GET_PROG_INFO(0x14, 0x0, 0x0) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r1) (async) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000040)={0x3, 0x2, 0xb4, 0x1, 0xf, "53f339a92a8a1b46"}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5425, 0x3) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5427, 0x3) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r0, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r7, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r6, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r4, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r7, 0xffffffffffffffff, r8, r9]}, 0x80) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000640)={0x45c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4c}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe01}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x8a7, 0x0, 0x80, 0x40}, {0x3aa, 0x0, 0x80, 0xdb}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xdb0}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x326}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x45c}}, 0x40) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) 05:45:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5428, 0x3) 05:45:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x7e, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r0, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r7, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r6, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r4, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r7, 0xffffffffffffffff, r8, r9]}, 0x80) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000640)={0x45c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4c}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe01}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x8a7, 0x0, 0x80, 0x40}, {0x3aa, 0x0, 0x80, 0xdb}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xdb0}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x326}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x45c}}, 0x40) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(r0, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r7, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(r6, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r4, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r7, 0xffffffffffffffff, r8, r9]}, 0x80) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000640)={0x45c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4c}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe01}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x8a7, 0x0, 0x80, 0x40}, {0x3aa, 0x0, 0x80, 0xdb}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xdb0}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x326}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x45c}}, 0x40) (async) 05:45:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/246, 0x27, 0xf6, 0x1}, 0x20) [ 1055.511596] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.517196] ieee802154 phy1 wpan1: encryption failed: -22 05:45:51 executing program 1: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCXONC(r0, 0x5429, 0x3) 05:45:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000001c0)=""/198, 0x26, 0xc6, 0x3}, 0x20) 05:45:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000580)=""/246, 0x28, 0xf6, 0x1}, 0x20) 05:45:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r0, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r6 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r8 = syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r7, 0x5, 0x5, 0x5}, 0x48) read$usbmon(r6, &(0x7f0000000400)=""/26, 0x1a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r4, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r7, 0xffffffffffffffff, r8, r9]}, 0x80) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000640)={0x45c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4c}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe01}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x8a7, 0x0, 0x80, 0x40}, {0x3aa, 0x0, 0x80, 0xdb}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xdb0}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x326}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x45c}}, 0x40) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r2) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r1, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(r0, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, r2, r3]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x1, 0x86b5, 0x1010, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x805, 0x81, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r6) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async) syz_open_dev$vcsa(&(0x7f0000000040), 0x6, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x8000, 0xffff0efd, 0x3efaada4, 0x0, 0x1, 0x9, '\x00', 0x0, r7, 0x5, 0x5, 0x5}, 0x48) (async) read$usbmon(r6, &(0x7f0000000400)=""/26, 0x1a) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000cf00000000000000090000001b14c0ffffffffff18470000ffffffff00000000000000009500000000000000850000004100000018280000", @ANYRES32=r4, @ANYBLOB="00000c009f0000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffff8, 0x6e, &(0x7f0000000140)=""/110, 0x41100, 0x1c, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000000200)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x0, 0x1f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r7, 0xffffffffffffffff, r8, r9]}, 0x80) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000640)={0x45c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4c}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe01}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x8a7, 0x0, 0x80, 0x40}, {0x3aa, 0x0, 0x80, 0xdb}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xdb0}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x326}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x4}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffd}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_lin