[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.201' (ECDSA) to the list of known hosts. 2021/01/14 07:20:02 fuzzer started 2021/01/14 07:20:03 dialing manager at 10.128.0.26:38787 2021/01/14 07:20:03 syscalls: 3495 2021/01/14 07:20:03 code coverage: enabled 2021/01/14 07:20:03 comparison tracing: enabled 2021/01/14 07:20:03 extra coverage: enabled 2021/01/14 07:20:03 setuid sandbox: enabled 2021/01/14 07:20:03 namespace sandbox: enabled 2021/01/14 07:20:03 Android sandbox: /sys/fs/selinux/policy does not exist 2021/01/14 07:20:03 fault injection: enabled 2021/01/14 07:20:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/01/14 07:20:03 net packet injection: enabled 2021/01/14 07:20:03 net device setup: enabled 2021/01/14 07:20:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/01/14 07:20:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/01/14 07:20:03 USB emulation: enabled 2021/01/14 07:20:03 hci packet injection: enabled 2021/01/14 07:20:03 wifi device emulation: enabled 2021/01/14 07:20:03 fetching corpus: 0, signal 0/2000 (executing program) 2021/01/14 07:20:03 fetching corpus: 50, signal 27634/31421 (executing program) 2021/01/14 07:20:03 fetching corpus: 100, signal 46081/51573 (executing program) 2021/01/14 07:20:03 fetching corpus: 150, signal 52339/59552 (executing program) 2021/01/14 07:20:03 fetching corpus: 200, signal 60158/69022 (executing program) 2021/01/14 07:20:03 fetching corpus: 250, signal 66715/77178 (executing program) 2021/01/14 07:20:03 fetching corpus: 300, signal 72657/84698 (executing program) 2021/01/14 07:20:03 fetching corpus: 350, signal 76209/89865 (executing program) 2021/01/14 07:20:03 fetching corpus: 400, signal 85497/100515 (executing program) 2021/01/14 07:20:03 fetching corpus: 450, signal 89394/105894 (executing program) 2021/01/14 07:20:03 fetching corpus: 500, signal 93996/111952 (executing program) 2021/01/14 07:20:03 fetching corpus: 550, signal 97724/117122 (executing program) 2021/01/14 07:20:04 fetching corpus: 600, signal 100403/121281 (executing program) 2021/01/14 07:20:04 fetching corpus: 650, signal 102422/124790 (executing program) 2021/01/14 07:20:04 fetching corpus: 700, signal 106021/129752 (executing program) 2021/01/14 07:20:04 fetching corpus: 750, signal 109726/134779 (executing program) 2021/01/14 07:20:04 fetching corpus: 800, signal 113142/139514 (executing program) 2021/01/14 07:20:04 fetching corpus: 850, signal 116983/144661 (executing program) 2021/01/14 07:20:04 fetching corpus: 900, signal 120077/149077 (executing program) 2021/01/14 07:20:04 fetching corpus: 950, signal 124129/154306 (executing program) 2021/01/14 07:20:04 fetching corpus: 1000, signal 127889/159229 (executing program) 2021/01/14 07:20:04 fetching corpus: 1050, signal 130759/163376 (executing program) 2021/01/14 07:20:04 fetching corpus: 1100, signal 132309/166312 (executing program) 2021/01/14 07:20:04 fetching corpus: 1150, signal 135167/170346 (executing program) 2021/01/14 07:20:04 fetching corpus: 1200, signal 137622/173982 (executing program) 2021/01/14 07:20:04 fetching corpus: 1250, signal 141767/179182 (executing program) 2021/01/14 07:20:04 fetching corpus: 1300, signal 144805/183325 (executing program) 2021/01/14 07:20:04 fetching corpus: 1350, signal 146487/186262 (executing program) 2021/01/14 07:20:04 fetching corpus: 1400, signal 148089/189106 (executing program) 2021/01/14 07:20:04 fetching corpus: 1450, signal 150124/192302 (executing program) 2021/01/14 07:20:04 fetching corpus: 1500, signal 152240/195567 (executing program) 2021/01/14 07:20:05 fetching corpus: 1550, signal 154227/198739 (executing program) 2021/01/14 07:20:05 fetching corpus: 1600, signal 155601/201347 (executing program) 2021/01/14 07:20:05 fetching corpus: 1650, signal 157077/204029 (executing program) 2021/01/14 07:20:05 fetching corpus: 1700, signal 158979/206995 (executing program) 2021/01/14 07:20:05 fetching corpus: 1750, signal 160760/209912 (executing program) 2021/01/14 07:20:05 fetching corpus: 1800, signal 163615/213710 (executing program) 2021/01/14 07:20:05 fetching corpus: 1850, signal 165603/216759 (executing program) 2021/01/14 07:20:05 fetching corpus: 1900, signal 167274/219542 (executing program) 2021/01/14 07:20:05 fetching corpus: 1950, signal 168495/221926 (executing program) 2021/01/14 07:20:05 fetching corpus: 2000, signal 169639/224219 (executing program) 2021/01/14 07:20:05 fetching corpus: 2050, signal 171407/227085 (executing program) 2021/01/14 07:20:05 fetching corpus: 2100, signal 172654/229413 (executing program) 2021/01/14 07:20:05 fetching corpus: 2150, signal 174730/232405 (executing program) 2021/01/14 07:20:05 fetching corpus: 2200, signal 176181/234955 (executing program) 2021/01/14 07:20:06 fetching corpus: 2250, signal 177541/237390 (executing program) 2021/01/14 07:20:06 fetching corpus: 2300, signal 178927/239851 (executing program) 2021/01/14 07:20:06 fetching corpus: 2350, signal 180988/242820 (executing program) 2021/01/14 07:20:06 fetching corpus: 2400, signal 182950/245680 (executing program) 2021/01/14 07:20:06 fetching corpus: 2450, signal 184425/248112 (executing program) 2021/01/14 07:20:06 fetching corpus: 2500, signal 185980/250613 (executing program) 2021/01/14 07:20:06 fetching corpus: 2550, signal 187295/252945 (executing program) 2021/01/14 07:20:06 fetching corpus: 2600, signal 188517/255156 (executing program) 2021/01/14 07:20:06 fetching corpus: 2650, signal 189620/257272 (executing program) 2021/01/14 07:20:06 fetching corpus: 2700, signal 190694/259374 (executing program) 2021/01/14 07:20:06 fetching corpus: 2750, signal 191723/261441 (executing program) 2021/01/14 07:20:06 fetching corpus: 2800, signal 193192/263827 (executing program) 2021/01/14 07:20:07 fetching corpus: 2850, signal 195449/266838 (executing program) 2021/01/14 07:20:07 fetching corpus: 2900, signal 196902/269172 (executing program) 2021/01/14 07:20:07 fetching corpus: 2950, signal 198433/271559 (executing program) 2021/01/14 07:20:07 fetching corpus: 3000, signal 199915/273921 (executing program) 2021/01/14 07:20:07 fetching corpus: 3050, signal 201302/276207 (executing program) 2021/01/14 07:20:07 fetching corpus: 3100, signal 202947/278621 (executing program) 2021/01/14 07:20:07 fetching corpus: 3150, signal 203790/280432 (executing program) 2021/01/14 07:20:07 fetching corpus: 3200, signal 205206/282656 (executing program) 2021/01/14 07:20:07 fetching corpus: 3250, signal 206060/284496 (executing program) 2021/01/14 07:20:07 fetching corpus: 3300, signal 207464/286702 (executing program) 2021/01/14 07:20:07 fetching corpus: 3350, signal 209050/289044 (executing program) 2021/01/14 07:20:07 fetching corpus: 3400, signal 210688/291439 (executing program) 2021/01/14 07:20:07 fetching corpus: 3450, signal 211716/293395 (executing program) 2021/01/14 07:20:07 fetching corpus: 3500, signal 212987/295498 (executing program) 2021/01/14 07:20:07 fetching corpus: 3550, signal 213817/297232 (executing program) 2021/01/14 07:20:07 fetching corpus: 3600, signal 214765/299081 (executing program) 2021/01/14 07:20:07 fetching corpus: 3650, signal 216507/301475 (executing program) 2021/01/14 07:20:07 fetching corpus: 3700, signal 217409/303293 (executing program) 2021/01/14 07:20:07 fetching corpus: 3750, signal 218339/305062 (executing program) 2021/01/14 07:20:08 fetching corpus: 3800, signal 219702/307198 (executing program) 2021/01/14 07:20:08 fetching corpus: 3850, signal 221836/309825 (executing program) 2021/01/14 07:20:08 fetching corpus: 3900, signal 222461/311369 (executing program) 2021/01/14 07:20:08 fetching corpus: 3950, signal 224350/313790 (executing program) 2021/01/14 07:20:08 fetching corpus: 4000, signal 225294/315548 (executing program) 2021/01/14 07:20:08 fetching corpus: 4050, signal 226645/317578 (executing program) 2021/01/14 07:20:08 fetching corpus: 4100, signal 227986/319613 (executing program) 2021/01/14 07:20:08 fetching corpus: 4150, signal 228867/321294 (executing program) 2021/01/14 07:20:08 fetching corpus: 4200, signal 230007/323137 (executing program) 2021/01/14 07:20:08 fetching corpus: 4250, signal 231131/324958 (executing program) 2021/01/14 07:20:09 fetching corpus: 4300, signal 232240/326804 (executing program) 2021/01/14 07:20:09 fetching corpus: 4350, signal 233219/328531 (executing program) 2021/01/14 07:20:09 fetching corpus: 4400, signal 233955/330113 (executing program) 2021/01/14 07:20:09 fetching corpus: 4450, signal 235076/331923 (executing program) 2021/01/14 07:20:09 fetching corpus: 4500, signal 235864/333481 (executing program) 2021/01/14 07:20:09 fetching corpus: 4550, signal 236413/334905 (executing program) 2021/01/14 07:20:09 fetching corpus: 4600, signal 237855/336875 (executing program) 2021/01/14 07:20:09 fetching corpus: 4650, signal 238726/338462 (executing program) 2021/01/14 07:20:09 fetching corpus: 4700, signal 239543/340054 (executing program) 2021/01/14 07:20:09 fetching corpus: 4750, signal 242888/343188 (executing program) 2021/01/14 07:20:09 fetching corpus: 4800, signal 243547/344623 (executing program) 2021/01/14 07:20:09 fetching corpus: 4850, signal 244563/346306 (executing program) 2021/01/14 07:20:09 fetching corpus: 4900, signal 245338/347854 (executing program) 2021/01/14 07:20:09 fetching corpus: 4950, signal 246056/349342 (executing program) 2021/01/14 07:20:09 fetching corpus: 5000, signal 246675/350767 (executing program) 2021/01/14 07:20:09 fetching corpus: 5050, signal 247460/352220 (executing program) 2021/01/14 07:20:09 fetching corpus: 5100, signal 248369/353800 (executing program) 2021/01/14 07:20:10 fetching corpus: 5150, signal 248856/355135 (executing program) 2021/01/14 07:20:10 fetching corpus: 5200, signal 249969/356790 (executing program) 2021/01/14 07:20:10 fetching corpus: 5250, signal 250565/358207 (executing program) 2021/01/14 07:20:10 fetching corpus: 5300, signal 251263/359591 (executing program) 2021/01/14 07:20:10 fetching corpus: 5350, signal 251970/361004 (executing program) 2021/01/14 07:20:10 fetching corpus: 5400, signal 252776/362464 (executing program) 2021/01/14 07:20:10 fetching corpus: 5450, signal 253460/363895 (executing program) 2021/01/14 07:20:10 fetching corpus: 5500, signal 255108/365865 (executing program) 2021/01/14 07:20:10 fetching corpus: 5550, signal 255846/367254 (executing program) 2021/01/14 07:20:10 fetching corpus: 5600, signal 256589/368680 (executing program) 2021/01/14 07:20:10 fetching corpus: 5650, signal 257603/370249 (executing program) 2021/01/14 07:20:10 fetching corpus: 5700, signal 258021/371441 (executing program) 2021/01/14 07:20:10 fetching corpus: 5750, signal 258953/372942 (executing program) 2021/01/14 07:20:10 fetching corpus: 5800, signal 260005/374453 (executing program) 2021/01/14 07:20:10 fetching corpus: 5850, signal 260449/375673 (executing program) 2021/01/14 07:20:10 fetching corpus: 5900, signal 261609/377282 (executing program) 2021/01/14 07:20:10 fetching corpus: 5950, signal 262212/378556 (executing program) 2021/01/14 07:20:10 fetching corpus: 6000, signal 263146/380005 (executing program) 2021/01/14 07:20:11 fetching corpus: 6050, signal 263760/381282 (executing program) 2021/01/14 07:20:11 fetching corpus: 6100, signal 264891/382859 (executing program) 2021/01/14 07:20:11 fetching corpus: 6150, signal 265445/384111 (executing program) 2021/01/14 07:20:11 fetching corpus: 6200, signal 266314/385545 (executing program) 2021/01/14 07:20:11 fetching corpus: 6250, signal 267432/387035 (executing program) 2021/01/14 07:20:11 fetching corpus: 6300, signal 268742/388592 (executing program) 2021/01/14 07:20:11 fetching corpus: 6350, signal 269562/389944 (executing program) 2021/01/14 07:20:11 fetching corpus: 6400, signal 270925/391603 (executing program) 2021/01/14 07:20:11 fetching corpus: 6450, signal 271681/392927 (executing program) 2021/01/14 07:20:11 fetching corpus: 6500, signal 272349/394228 (executing program) 2021/01/14 07:20:11 fetching corpus: 6550, signal 273078/395518 (executing program) 2021/01/14 07:20:12 fetching corpus: 6600, signal 273546/396696 (executing program) 2021/01/14 07:20:12 fetching corpus: 6650, signal 274363/398016 (executing program) 2021/01/14 07:20:12 fetching corpus: 6700, signal 275314/399396 (executing program) 2021/01/14 07:20:12 fetching corpus: 6750, signal 275700/400517 (executing program) 2021/01/14 07:20:12 fetching corpus: 6800, signal 276361/401745 (executing program) 2021/01/14 07:20:12 fetching corpus: 6850, signal 277622/403241 (executing program) 2021/01/14 07:20:12 fetching corpus: 6900, signal 278302/404420 (executing program) 2021/01/14 07:20:12 fetching corpus: 6950, signal 278932/405605 (executing program) 2021/01/14 07:20:12 fetching corpus: 7000, signal 279568/406812 (executing program) 2021/01/14 07:20:12 fetching corpus: 7050, signal 280181/407962 (executing program) 2021/01/14 07:20:12 fetching corpus: 7100, signal 280921/409234 (executing program) 2021/01/14 07:20:12 fetching corpus: 7150, signal 281382/410335 (executing program) 2021/01/14 07:20:13 fetching corpus: 7200, signal 282083/411498 (executing program) 2021/01/14 07:20:13 fetching corpus: 7250, signal 282770/412631 (executing program) 2021/01/14 07:20:13 fetching corpus: 7300, signal 283674/413904 (executing program) 2021/01/14 07:20:13 fetching corpus: 7350, signal 284831/415209 (executing program) 2021/01/14 07:20:13 fetching corpus: 7400, signal 286068/416594 (executing program) 2021/01/14 07:20:13 fetching corpus: 7450, signal 286831/417777 (executing program) 2021/01/14 07:20:13 fetching corpus: 7500, signal 287342/418857 (executing program) 2021/01/14 07:20:13 fetching corpus: 7550, signal 288159/420076 (executing program) 2021/01/14 07:20:13 fetching corpus: 7600, signal 288677/421180 (executing program) 2021/01/14 07:20:13 fetching corpus: 7650, signal 289493/422330 (executing program) 2021/01/14 07:20:13 fetching corpus: 7700, signal 290546/423551 (executing program) 2021/01/14 07:20:13 fetching corpus: 7750, signal 290949/424594 (executing program) 2021/01/14 07:20:13 fetching corpus: 7800, signal 291554/425680 (executing program) 2021/01/14 07:20:13 fetching corpus: 7850, signal 292433/426887 (executing program) 2021/01/14 07:20:14 fetching corpus: 7900, signal 292870/427882 (executing program) 2021/01/14 07:20:14 fetching corpus: 7950, signal 293584/428990 (executing program) 2021/01/14 07:20:14 fetching corpus: 8000, signal 294043/430003 (executing program) 2021/01/14 07:20:14 fetching corpus: 8050, signal 294822/431137 (executing program) 2021/01/14 07:20:14 fetching corpus: 8100, signal 295435/432214 (executing program) 2021/01/14 07:20:14 fetching corpus: 8150, signal 296175/433292 (executing program) 2021/01/14 07:20:14 fetching corpus: 8199, signal 296708/434294 (executing program) 2021/01/14 07:20:14 fetching corpus: 8249, signal 297330/435346 (executing program) 2021/01/14 07:20:14 fetching corpus: 8299, signal 297757/436317 (executing program) 2021/01/14 07:20:14 fetching corpus: 8349, signal 298513/437394 (executing program) 2021/01/14 07:20:14 fetching corpus: 8399, signal 299223/438459 (executing program) 2021/01/14 07:20:14 fetching corpus: 8449, signal 299705/439416 (executing program) 2021/01/14 07:20:14 fetching corpus: 8499, signal 300283/440439 (executing program) 2021/01/14 07:20:14 fetching corpus: 8549, signal 300896/441383 (executing program) 2021/01/14 07:20:15 fetching corpus: 8599, signal 301257/442296 (executing program) 2021/01/14 07:20:15 fetching corpus: 8649, signal 301726/443273 (executing program) 2021/01/14 07:20:15 fetching corpus: 8699, signal 302911/444442 (executing program) 2021/01/14 07:20:15 fetching corpus: 8749, signal 303461/445389 (executing program) 2021/01/14 07:20:15 fetching corpus: 8799, signal 304457/446530 (executing program) 2021/01/14 07:20:15 fetching corpus: 8849, signal 304856/447449 (executing program) 2021/01/14 07:20:15 fetching corpus: 8899, signal 305586/448472 (executing program) 2021/01/14 07:20:15 fetching corpus: 8949, signal 306142/449432 (executing program) 2021/01/14 07:20:15 fetching corpus: 8999, signal 306457/450328 (executing program) 2021/01/14 07:20:15 fetching corpus: 9049, signal 307097/451281 (executing program) 2021/01/14 07:20:15 fetching corpus: 9099, signal 307542/452161 (executing program) 2021/01/14 07:20:15 fetching corpus: 9149, signal 308070/453149 (executing program) 2021/01/14 07:20:15 fetching corpus: 9199, signal 308466/454063 (executing program) 2021/01/14 07:20:15 fetching corpus: 9249, signal 309030/455017 (executing program) 2021/01/14 07:20:15 fetching corpus: 9299, signal 309351/455944 (executing program) 2021/01/14 07:20:16 fetching corpus: 9349, signal 309807/456862 (executing program) 2021/01/14 07:20:16 fetching corpus: 9399, signal 310359/457836 (executing program) 2021/01/14 07:20:16 fetching corpus: 9449, signal 310699/458732 (executing program) 2021/01/14 07:20:16 fetching corpus: 9499, signal 311856/459838 (executing program) 2021/01/14 07:20:16 fetching corpus: 9549, signal 312178/460701 (executing program) 2021/01/14 07:20:16 fetching corpus: 9599, signal 312588/461592 (executing program) 2021/01/14 07:20:16 fetching corpus: 9649, signal 313014/462471 (executing program) 2021/01/14 07:20:16 fetching corpus: 9699, signal 313565/463345 (executing program) 2021/01/14 07:20:16 fetching corpus: 9749, signal 314152/464261 (executing program) 2021/01/14 07:20:16 fetching corpus: 9799, signal 314768/465176 (executing program) 2021/01/14 07:20:16 fetching corpus: 9849, signal 315439/466049 (executing program) 2021/01/14 07:20:16 fetching corpus: 9899, signal 316131/466954 (executing program) 2021/01/14 07:20:16 fetching corpus: 9949, signal 316816/467855 (executing program) 2021/01/14 07:20:16 fetching corpus: 9999, signal 317160/468651 (executing program) 2021/01/14 07:20:17 fetching corpus: 10049, signal 317500/469483 (executing program) 2021/01/14 07:20:17 fetching corpus: 10099, signal 317831/470284 (executing program) 2021/01/14 07:20:17 fetching corpus: 10149, signal 318430/471177 (executing program) 2021/01/14 07:20:17 fetching corpus: 10199, signal 318857/471935 (executing program) 2021/01/14 07:20:17 fetching corpus: 10249, signal 319671/472898 (executing program) 2021/01/14 07:20:17 fetching corpus: 10299, signal 320122/473735 (executing program) 2021/01/14 07:20:17 fetching corpus: 10349, signal 320550/474568 (executing program) 2021/01/14 07:20:17 fetching corpus: 10399, signal 321050/475388 (executing program) 2021/01/14 07:20:17 fetching corpus: 10449, signal 321359/476202 (executing program) 2021/01/14 07:20:17 fetching corpus: 10499, signal 321776/476994 (executing program) 2021/01/14 07:20:17 fetching corpus: 10549, signal 322216/477852 (executing program) 2021/01/14 07:20:17 fetching corpus: 10599, signal 322517/478658 (executing program) 2021/01/14 07:20:17 fetching corpus: 10649, signal 322859/479436 (executing program) 2021/01/14 07:20:17 fetching corpus: 10699, signal 323778/480317 (executing program) 2021/01/14 07:20:17 fetching corpus: 10749, signal 324430/481136 (executing program) 2021/01/14 07:20:18 fetching corpus: 10799, signal 324850/481933 (executing program) 2021/01/14 07:20:18 fetching corpus: 10849, signal 325350/482767 (executing program) 2021/01/14 07:20:18 fetching corpus: 10899, signal 325920/483610 (executing program) 2021/01/14 07:20:18 fetching corpus: 10949, signal 326284/484382 (executing program) 2021/01/14 07:20:18 fetching corpus: 10999, signal 326569/485142 (executing program) 2021/01/14 07:20:18 fetching corpus: 11049, signal 327728/485975 (executing program) 2021/01/14 07:20:18 fetching corpus: 11099, signal 327991/486750 (executing program) 2021/01/14 07:20:18 fetching corpus: 11149, signal 328556/487554 (executing program) 2021/01/14 07:20:18 fetching corpus: 11199, signal 329426/488381 (executing program) 2021/01/14 07:20:18 fetching corpus: 11249, signal 330037/489155 (executing program) 2021/01/14 07:20:18 fetching corpus: 11299, signal 330657/489932 (executing program) 2021/01/14 07:20:18 fetching corpus: 11349, signal 331098/490676 (executing program) 2021/01/14 07:20:18 fetching corpus: 11399, signal 331530/491420 (executing program) 2021/01/14 07:20:19 fetching corpus: 11449, signal 331944/492155 (executing program) 2021/01/14 07:20:19 fetching corpus: 11499, signal 332262/492861 (executing program) 2021/01/14 07:20:19 fetching corpus: 11549, signal 332810/493605 (executing program) 2021/01/14 07:20:19 fetching corpus: 11599, signal 333278/494328 (executing program) 2021/01/14 07:20:19 fetching corpus: 11649, signal 333916/495051 (executing program) 2021/01/14 07:20:19 fetching corpus: 11699, signal 334651/495780 (executing program) 2021/01/14 07:20:19 fetching corpus: 11749, signal 335091/496511 (executing program) 2021/01/14 07:20:19 fetching corpus: 11799, signal 335459/497213 (executing program) 2021/01/14 07:20:19 fetching corpus: 11849, signal 335782/497897 (executing program) 2021/01/14 07:20:19 fetching corpus: 11899, signal 336259/498552 (executing program) 2021/01/14 07:20:19 fetching corpus: 11949, signal 336688/499266 (executing program) 2021/01/14 07:20:19 fetching corpus: 11999, signal 337201/499962 (executing program) 2021/01/14 07:20:19 fetching corpus: 12049, signal 337741/500664 (executing program) 2021/01/14 07:20:19 fetching corpus: 12099, signal 338159/501358 (executing program) 2021/01/14 07:20:19 fetching corpus: 12149, signal 338553/502097 (executing program) 2021/01/14 07:20:20 fetching corpus: 12199, signal 338832/502786 (executing program) 2021/01/14 07:20:20 fetching corpus: 12249, signal 339374/503511 (executing program) 2021/01/14 07:20:20 fetching corpus: 12299, signal 339601/504165 (executing program) 2021/01/14 07:20:20 fetching corpus: 12349, signal 340024/504829 (executing program) 2021/01/14 07:20:20 fetching corpus: 12399, signal 340599/505540 (executing program) 2021/01/14 07:20:20 fetching corpus: 12449, signal 340873/506208 (executing program) 2021/01/14 07:20:20 fetching corpus: 12499, signal 341335/506837 (executing program) 2021/01/14 07:20:20 fetching corpus: 12549, signal 342228/507509 (executing program) 2021/01/14 07:20:20 fetching corpus: 12599, signal 342629/508145 (executing program) 2021/01/14 07:20:20 fetching corpus: 12649, signal 343013/508821 (executing program) 2021/01/14 07:20:20 fetching corpus: 12699, signal 343409/509168 (executing program) 2021/01/14 07:20:20 fetching corpus: 12749, signal 344251/509168 (executing program) 2021/01/14 07:20:20 fetching corpus: 12799, signal 344556/509168 (executing program) 2021/01/14 07:20:21 fetching corpus: 12849, signal 345000/509168 (executing program) 2021/01/14 07:20:21 fetching corpus: 12899, signal 345743/509168 (executing program) 2021/01/14 07:20:21 fetching corpus: 12949, signal 346219/509254 (executing program) 2021/01/14 07:20:21 fetching corpus: 12999, signal 346792/509254 (executing program) 2021/01/14 07:20:21 fetching corpus: 13049, signal 347166/509254 (executing program) 2021/01/14 07:20:21 fetching corpus: 13099, signal 347664/509254 (executing program) 2021/01/14 07:20:21 fetching corpus: 13149, signal 348066/509254 (executing program) 2021/01/14 07:20:21 fetching corpus: 13199, signal 348483/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13249, signal 349081/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13299, signal 349565/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13349, signal 349939/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13399, signal 350342/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13449, signal 350648/509259 (executing program) 2021/01/14 07:20:21 fetching corpus: 13499, signal 350899/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13549, signal 351143/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13599, signal 351564/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13649, signal 351871/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13699, signal 352427/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13749, signal 352906/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13799, signal 353462/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13849, signal 353725/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13899, signal 354113/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13949, signal 354361/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 13999, signal 354848/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 14049, signal 355368/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 14099, signal 355596/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 14149, signal 355973/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 14199, signal 356331/509259 (executing program) 2021/01/14 07:20:22 fetching corpus: 14249, signal 356758/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14299, signal 357127/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14349, signal 357428/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14399, signal 357797/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14449, signal 358323/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14499, signal 358895/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14549, signal 359144/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14599, signal 359415/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14649, signal 359719/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14699, signal 360123/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14749, signal 360460/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14799, signal 361186/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14849, signal 361610/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14899, signal 361920/509259 (executing program) 2021/01/14 07:20:23 fetching corpus: 14949, signal 362183/509261 (executing program) 2021/01/14 07:20:23 fetching corpus: 14999, signal 362624/509263 (executing program) 2021/01/14 07:20:24 fetching corpus: 15049, signal 362837/509263 (executing program) 2021/01/14 07:20:24 fetching corpus: 15099, signal 363015/509263 (executing program) 2021/01/14 07:20:24 fetching corpus: 15149, signal 363355/509263 (executing program) 2021/01/14 07:20:24 fetching corpus: 15199, signal 363830/509274 (executing program) 2021/01/14 07:20:24 fetching corpus: 15249, signal 364429/509276 (executing program) 2021/01/14 07:20:25 fetching corpus: 15299, signal 364945/509276 (executing program) 2021/01/14 07:20:25 fetching corpus: 15349, signal 365140/509276 (executing program) 2021/01/14 07:20:25 fetching corpus: 15399, signal 365443/509276 (executing program) 2021/01/14 07:20:25 fetching corpus: 15449, signal 365704/509276 (executing program) 2021/01/14 07:20:25 fetching corpus: 15499, signal 366037/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15549, signal 366247/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15599, signal 366460/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15649, signal 366783/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15699, signal 367351/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15749, signal 367675/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15799, signal 367968/509280 (executing program) 2021/01/14 07:20:25 fetching corpus: 15849, signal 368385/509282 (executing program) 2021/01/14 07:20:25 fetching corpus: 15899, signal 368766/509282 (executing program) 2021/01/14 07:20:26 fetching corpus: 15949, signal 369192/509282 (executing program) 2021/01/14 07:20:26 fetching corpus: 15999, signal 369717/509282 (executing program) 2021/01/14 07:20:26 fetching corpus: 16049, signal 370047/509282 (executing program) 2021/01/14 07:20:26 fetching corpus: 16099, signal 370298/509282 (executing program) 2021/01/14 07:20:26 fetching corpus: 16149, signal 370599/509283 (executing program) 2021/01/14 07:20:26 fetching corpus: 16199, signal 371007/509283 (executing program) 2021/01/14 07:20:27 fetching corpus: 16249, signal 372093/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16299, signal 372513/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16349, signal 372789/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16399, signal 373144/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16449, signal 373381/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16499, signal 373622/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16549, signal 374118/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16599, signal 374603/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16649, signal 374848/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16699, signal 375393/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16749, signal 376000/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16799, signal 376613/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16849, signal 377096/509284 (executing program) 2021/01/14 07:20:27 fetching corpus: 16899, signal 377487/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 16949, signal 377761/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 16999, signal 378234/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17049, signal 378521/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17099, signal 379016/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17149, signal 379245/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17199, signal 379557/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17249, signal 379829/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17299, signal 380258/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17349, signal 380520/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17399, signal 380970/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17449, signal 381215/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17499, signal 381430/509284 (executing program) 2021/01/14 07:20:28 fetching corpus: 17549, signal 381819/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17599, signal 382100/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17649, signal 382556/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17699, signal 382783/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17749, signal 383027/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17799, signal 383461/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17849, signal 383706/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17899, signal 384139/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17949, signal 384552/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 17999, signal 385159/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 18049, signal 385452/509284 (executing program) 2021/01/14 07:20:29 fetching corpus: 18099, signal 385688/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18149, signal 386157/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18199, signal 386399/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18249, signal 386689/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18299, signal 387075/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18349, signal 387471/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18399, signal 387828/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18449, signal 388215/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18499, signal 388601/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18549, signal 388895/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18599, signal 389216/509284 (executing program) 2021/01/14 07:20:30 fetching corpus: 18649, signal 389473/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18699, signal 389645/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18749, signal 389900/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18799, signal 390247/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18849, signal 390533/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18899, signal 390739/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18949, signal 391084/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 18999, signal 391297/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 19049, signal 391601/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 19099, signal 391828/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 19149, signal 392187/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 19199, signal 392402/509284 (executing program) 2021/01/14 07:20:31 fetching corpus: 19249, signal 392634/509284 (executing program) 2021/01/14 07:20:32 fetching corpus: 19299, signal 392844/509284 (executing program) 2021/01/14 07:20:32 fetching corpus: 19349, signal 393433/509284 (executing program) 2021/01/14 07:20:32 fetching corpus: 19399, signal 393680/509284 (executing program) 2021/01/14 07:20:32 fetching corpus: 19449, signal 393984/509284 (executing program) 2021/01/14 07:20:33 fetching corpus: 19499, signal 394253/509284 (executing program) 2021/01/14 07:20:33 fetching corpus: 19549, signal 394553/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19599, signal 394877/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19649, signal 395248/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19699, signal 395632/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19749, signal 396022/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19799, signal 396269/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19849, signal 396792/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19899, signal 397008/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19949, signal 397268/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 19999, signal 397491/509343 (executing program) 2021/01/14 07:20:33 fetching corpus: 20049, signal 398087/509343 (executing program) 2021/01/14 07:20:34 fetching corpus: 20099, signal 398324/509343 (executing program) 2021/01/14 07:20:34 fetching corpus: 20149, signal 398623/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20199, signal 399119/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20249, signal 399325/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20299, signal 400018/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20349, signal 400264/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20399, signal 400493/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20449, signal 400911/509381 (executing program) 2021/01/14 07:20:34 fetching corpus: 20499, signal 401345/509385 (executing program) 2021/01/14 07:20:34 fetching corpus: 20549, signal 401640/509385 (executing program) 2021/01/14 07:20:34 fetching corpus: 20599, signal 401942/509385 (executing program) 2021/01/14 07:20:34 fetching corpus: 20649, signal 402285/509385 (executing program) 2021/01/14 07:20:34 fetching corpus: 20699, signal 402480/509385 (executing program) 2021/01/14 07:20:35 fetching corpus: 20749, signal 402710/509385 (executing program) 2021/01/14 07:20:35 fetching corpus: 20799, signal 403015/509385 (executing program) 2021/01/14 07:20:35 fetching corpus: 20849, signal 403299/509385 (executing program) 2021/01/14 07:20:35 fetching corpus: 20899, signal 403512/509385 (executing program) 2021/01/14 07:20:35 fetching corpus: 20949, signal 403803/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 20999, signal 404031/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21049, signal 404295/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21099, signal 404518/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21149, signal 404897/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21199, signal 405077/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21249, signal 405317/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21299, signal 405829/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21349, signal 406566/509395 (executing program) 2021/01/14 07:20:35 fetching corpus: 21399, signal 406879/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21449, signal 407238/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21499, signal 407444/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21549, signal 407796/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21599, signal 408332/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21649, signal 408633/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21699, signal 410437/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21749, signal 410599/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21799, signal 410814/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21849, signal 411188/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21899, signal 411496/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21949, signal 411952/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 21999, signal 412353/509396 (executing program) 2021/01/14 07:20:36 fetching corpus: 22049, signal 412674/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22099, signal 413118/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22149, signal 413402/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22199, signal 413760/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22249, signal 414002/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22299, signal 414222/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22349, signal 414434/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22399, signal 414602/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22449, signal 414800/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22499, signal 415016/509396 (executing program) 2021/01/14 07:20:37 fetching corpus: 22549, signal 415165/509396 (executing program) 2021/01/14 07:20:38 fetching corpus: 22599, signal 415442/509396 (executing program) 2021/01/14 07:20:38 fetching corpus: 22649, signal 415700/509396 (executing program) 2021/01/14 07:20:38 fetching corpus: 22699, signal 415925/509396 (executing program) 2021/01/14 07:20:38 fetching corpus: 22749, signal 417450/509396 (executing program) 2021/01/14 07:20:38 fetching corpus: 22799, signal 417652/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 22849, signal 417934/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 22899, signal 418109/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 22949, signal 418449/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 22999, signal 418586/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 23049, signal 418882/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 23099, signal 419125/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 23149, signal 419371/509397 (executing program) 2021/01/14 07:20:38 fetching corpus: 23199, signal 419646/509397 (executing program) 2021/01/14 07:20:39 fetching corpus: 23249, signal 419880/509397 (executing program) 2021/01/14 07:20:40 fetching corpus: 23299, signal 420489/509397 (executing program) 2021/01/14 07:20:40 fetching corpus: 23349, signal 420736/509405 (executing program) 2021/01/14 07:20:40 fetching corpus: 23399, signal 420916/509405 (executing program) 2021/01/14 07:20:40 fetching corpus: 23449, signal 421124/509405 (executing program) 2021/01/14 07:20:40 fetching corpus: 23499, signal 421345/509405 (executing program) 2021/01/14 07:20:41 fetching corpus: 23549, signal 421560/509405 (executing program) 2021/01/14 07:20:41 fetching corpus: 23599, signal 422046/509405 (executing program) 2021/01/14 07:20:41 fetching corpus: 23649, signal 422235/509405 (executing program) 2021/01/14 07:20:41 fetching corpus: 23699, signal 422452/509406 (executing program) 2021/01/14 07:20:41 fetching corpus: 23749, signal 422644/509406 (executing program) 2021/01/14 07:20:41 fetching corpus: 23799, signal 422888/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 23849, signal 423018/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 23899, signal 423277/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 23949, signal 423544/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 23999, signal 423962/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 24049, signal 424223/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 24099, signal 424450/509411 (executing program) 2021/01/14 07:20:41 fetching corpus: 24149, signal 424680/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24199, signal 425037/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24249, signal 425354/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24299, signal 425801/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24349, signal 426042/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24399, signal 426269/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24449, signal 426515/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24499, signal 426677/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24549, signal 426876/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24599, signal 427073/509411 (executing program) 2021/01/14 07:20:42 fetching corpus: 24649, signal 427299/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24699, signal 427503/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24749, signal 427851/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24799, signal 428097/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24849, signal 428340/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24899, signal 428578/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24949, signal 428760/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 24999, signal 428982/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25049, signal 429282/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25099, signal 429691/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25149, signal 429905/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25199, signal 430219/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25249, signal 430491/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25299, signal 430845/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25349, signal 431154/509411 (executing program) 2021/01/14 07:20:43 fetching corpus: 25399, signal 431309/509411 (executing program) 2021/01/14 07:20:44 fetching corpus: 25449, signal 431590/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25499, signal 431835/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25549, signal 432107/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25599, signal 432288/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25649, signal 432521/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25699, signal 432792/509412 (executing program) 2021/01/14 07:20:44 fetching corpus: 25749, signal 433011/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 25799, signal 433181/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 25849, signal 433377/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 25899, signal 433765/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 25949, signal 433976/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 25999, signal 434171/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 26049, signal 434409/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 26099, signal 434556/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 26149, signal 434889/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 26199, signal 435041/509412 (executing program) 2021/01/14 07:20:45 fetching corpus: 26249, signal 435317/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26299, signal 435541/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26349, signal 435736/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26399, signal 436741/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26449, signal 436912/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26499, signal 437123/509413 (executing program) 2021/01/14 07:20:46 fetching corpus: 26549, signal 437365/509456 (executing program) 2021/01/14 07:20:46 fetching corpus: 26599, signal 437650/509456 (executing program) 2021/01/14 07:20:46 fetching corpus: 26649, signal 437797/509456 (executing program) 2021/01/14 07:20:46 fetching corpus: 26699, signal 437992/509456 (executing program) 2021/01/14 07:20:46 fetching corpus: 26706, signal 438019/509456 (executing program) 2021/01/14 07:20:46 fetching corpus: 26706, signal 438019/509456 (executing program) 2021/01/14 07:20:48 starting 6 fuzzer processes 07:20:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x2, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:49 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001000)={0x0, 0x200000, 0x800}, 0x20) 07:20:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@deltaction={0x18, 0x32, 0xf23, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x12}]}, 0x18}}, 0x0) 07:20:49 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0xb, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:20:49 executing program 4: bpf$BPF_LINK_UPDATE(0x6, &(0x7f0000000100), 0x10) 07:20:49 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x17, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syzkaller login: [ 95.641484][ T8466] IPVS: ftp: loaded support on port[0] = 21 [ 95.756883][ T8466] chnl_net:caif_netlink_parms(): no params data found [ 95.857876][ T8468] IPVS: ftp: loaded support on port[0] = 21 [ 95.892999][ T8466] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.900713][ T8466] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.910552][ T8466] device bridge_slave_0 entered promiscuous mode [ 95.936186][ T8466] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.945087][ T8466] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.953254][ T8466] device bridge_slave_1 entered promiscuous mode [ 95.977516][ T8466] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 95.990564][ T8466] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.040535][ T8466] team0: Port device team_slave_0 added [ 96.105572][ T8470] IPVS: ftp: loaded support on port[0] = 21 [ 96.145507][ T8466] team0: Port device team_slave_1 added [ 96.248493][ T8468] chnl_net:caif_netlink_parms(): no params data found [ 96.282242][ T8466] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 96.291701][ T8466] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 96.322403][ T8466] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 96.348671][ T8472] IPVS: ftp: loaded support on port[0] = 21 [ 96.355567][ T8466] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 96.364249][ T8466] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 96.390840][ T8466] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 96.527229][ T8466] device hsr_slave_0 entered promiscuous mode [ 96.536329][ T8466] device hsr_slave_1 entered promiscuous mode [ 96.589484][ T8468] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.602971][ T8468] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.618691][ T8468] device bridge_slave_0 entered promiscuous mode [ 96.629038][ T8468] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.636782][ T8468] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.645765][ T8468] device bridge_slave_1 entered promiscuous mode [ 96.684909][ T8474] IPVS: ftp: loaded support on port[0] = 21 [ 96.685099][ T8470] chnl_net:caif_netlink_parms(): no params data found [ 96.814982][ T8487] IPVS: ftp: loaded support on port[0] = 21 [ 96.825629][ T8468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.870649][ T8468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.957479][ T8470] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.964917][ T8470] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.975251][ T8470] device bridge_slave_0 entered promiscuous mode [ 96.985481][ T8470] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.992691][ T8470] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.000539][ T8470] device bridge_slave_1 entered promiscuous mode [ 97.020248][ T8468] team0: Port device team_slave_0 added [ 97.035115][ T8468] team0: Port device team_slave_1 added [ 97.070447][ T8470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.158828][ T8470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.185029][ T8468] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 97.192421][ T8468] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 97.219854][ T8468] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 97.269198][ T8468] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 97.277692][ T8468] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 97.304073][ T8468] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 97.315564][ T8472] chnl_net:caif_netlink_parms(): no params data found [ 97.337944][ T8470] team0: Port device team_slave_0 added [ 97.363262][ T8470] team0: Port device team_slave_1 added [ 97.439815][ T8468] device hsr_slave_0 entered promiscuous mode [ 97.447797][ T8468] device hsr_slave_1 entered promiscuous mode [ 97.458589][ T8468] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 97.466676][ T8468] Cannot create hsr debugfs directory [ 97.527649][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 97.535216][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 97.561228][ T8470] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 97.577802][ T8470] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 97.585389][ T8470] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 97.611947][ T8470] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 97.612064][ T3396] Bluetooth: hci0: command 0x0409 tx timeout [ 97.650398][ T8474] chnl_net:caif_netlink_parms(): no params data found [ 97.680670][ T8472] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.694615][ T8472] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.707432][ T8472] device bridge_slave_0 entered promiscuous mode [ 97.724972][ T8466] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 97.740163][ T8466] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 97.768820][ T8472] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.784785][ T8472] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.793263][ T8472] device bridge_slave_1 entered promiscuous mode [ 97.818266][ T8470] device hsr_slave_0 entered promiscuous mode [ 97.825803][ T8470] device hsr_slave_1 entered promiscuous mode [ 97.834326][ T8470] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 97.842750][ T8470] Cannot create hsr debugfs directory [ 97.848512][ T8466] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 97.860900][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 97.916479][ T8466] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 97.934294][ T8487] chnl_net:caif_netlink_parms(): no params data found [ 97.982011][ T8472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.020386][ T8472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.091409][ T3396] Bluetooth: hci2: command 0x0409 tx timeout [ 98.140340][ T8472] team0: Port device team_slave_0 added [ 98.159903][ T8487] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.167094][ T8487] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.176825][ T8487] device bridge_slave_0 entered promiscuous mode [ 98.196302][ T8472] team0: Port device team_slave_1 added [ 98.202544][ T8474] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.209723][ T8474] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.218078][ T8474] device bridge_slave_0 entered promiscuous mode [ 98.226457][ T8487] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.235025][ T8487] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.243167][ T8487] device bridge_slave_1 entered promiscuous mode [ 98.260934][ T34] Bluetooth: hci3: command 0x0409 tx timeout [ 98.263962][ T8487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.294603][ T8474] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.301792][ T8474] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.309524][ T8474] device bridge_slave_1 entered promiscuous mode [ 98.320236][ T8487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.372289][ T8472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.379226][ T8472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.417828][ T8472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.438130][ T8474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.459596][ T8472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.469422][ T8472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.495998][ T3193] Bluetooth: hci4: command 0x0409 tx timeout [ 98.503853][ T8472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 98.525948][ T8487] team0: Port device team_slave_0 added [ 98.535888][ T8474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.570581][ T8487] team0: Port device team_slave_1 added [ 98.593114][ T8472] device hsr_slave_0 entered promiscuous mode [ 98.600192][ T8472] device hsr_slave_1 entered promiscuous mode [ 98.611512][ T8472] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 98.619182][ T8472] Cannot create hsr debugfs directory [ 98.655825][ T8466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.682737][ T8474] team0: Port device team_slave_0 added [ 98.690438][ T8487] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.701047][ T8487] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.727903][ T8487] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.732673][ T3396] Bluetooth: hci5: command 0x0409 tx timeout [ 98.759501][ T8466] 8021q: adding VLAN 0 to HW filter on device team0 [ 98.791824][ T8474] team0: Port device team_slave_1 added [ 98.805450][ T8487] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.813362][ T8487] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.840186][ T8487] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 98.868549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.877254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.893490][ T8468] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 98.937690][ T8487] device hsr_slave_0 entered promiscuous mode [ 98.945685][ T8487] device hsr_slave_1 entered promiscuous mode [ 98.954203][ T8487] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 98.963226][ T8487] Cannot create hsr debugfs directory [ 98.968831][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.983575][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.992486][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.999751][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.008072][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.016928][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.025782][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.032925][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.041604][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.066541][ T8468] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 99.087058][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.094468][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.122004][ T8474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.140079][ T8474] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.149132][ T8474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.179779][ T8474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.202068][ T8468] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 99.219937][ T8468] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 99.274291][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 99.283772][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.307024][ T8474] device hsr_slave_0 entered promiscuous mode [ 99.315009][ T8474] device hsr_slave_1 entered promiscuous mode [ 99.322765][ T8474] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 99.330312][ T8474] Cannot create hsr debugfs directory [ 99.370674][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.379499][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.414699][ T8470] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 99.437298][ T8470] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 99.467085][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.479086][ T8470] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 99.514466][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.524229][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.546465][ T8470] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 99.569618][ T8466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 99.581930][ T8466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 99.604410][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.620254][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.641517][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.649699][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.682399][ T8472] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 99.695501][ T8127] Bluetooth: hci0: command 0x041b tx timeout [ 99.703925][ T8472] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 99.721806][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.756534][ T8472] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 99.769013][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 99.780008][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 99.795762][ T8466] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.814913][ T8472] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 99.915679][ T8487] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 99.950717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 99.959270][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.991182][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 99.992043][ T8487] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 100.010899][ T8487] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 100.043995][ T8468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.062115][ T8487] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 100.076259][ T8474] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 100.086838][ T8474] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 100.135965][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.144169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.157461][ T8468] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.165122][ T8474] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 100.180025][ T8466] device veth0_vlan entered promiscuous mode [ 100.187590][ T7] Bluetooth: hci2: command 0x041b tx timeout [ 100.210477][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.218664][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.228805][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.238227][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.247566][ T3193] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.254680][ T3193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.262801][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.271719][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.280002][ T3193] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.287202][ T3193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.294826][ T8474] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 100.330935][ T9770] Bluetooth: hci3: command 0x041b tx timeout [ 100.338470][ T8472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.359867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.368018][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.375879][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.385610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.394729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.411215][ T8470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.422048][ T8466] device veth1_vlan entered promiscuous mode [ 100.456071][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 100.465111][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 100.474818][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.483994][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.492889][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.501601][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.527844][ T8472] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.543334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.552401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.559980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.569894][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.578695][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.590480][ T5] Bluetooth: hci4: command 0x041b tx timeout [ 100.613720][ T8470] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.627742][ T8468] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.640044][ T8468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.656715][ T8466] device veth0_macvtap entered promiscuous mode [ 100.665300][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.677196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.685293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.694691][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.703524][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.710736][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.718447][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.727207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.735793][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.744494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.778766][ T8466] device veth1_macvtap entered promiscuous mode [ 100.802773][ T8487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.809683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.812058][ T34] Bluetooth: hci5: command 0x041b tx timeout [ 100.819261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 100.832367][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.840162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.849332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.857862][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.864970][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.873998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.883046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.891594][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.898632][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.906606][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.916030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.924782][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.931971][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.939690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.957737][ T8468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.991129][ T8466] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.002430][ T8466] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.009855][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.018462][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.027147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.034704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.043631][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.052483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.061181][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.069381][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.078150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.086960][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.095625][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.104195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.112903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.121728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.168238][ T8487] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.179876][ T8466] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.191504][ T8466] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.200396][ T8466] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.209077][ T8466] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.221944][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.229644][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.237950][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.246696][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.255489][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.264473][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.273149][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.281796][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.289884][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.299022][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.307679][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.316270][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.324733][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.335988][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.344460][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.354392][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.364370][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.383779][ T8472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.431183][ T8474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.439103][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 101.449099][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.460035][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 101.469470][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.477878][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.486548][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.495835][ T3396] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.502954][ T3396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.523171][ T8468] device veth0_vlan entered promiscuous mode [ 101.551760][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.559396][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.568217][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.576420][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.585709][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.594672][ T3396] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.601798][ T3396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.609645][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.631948][ T8468] device veth1_vlan entered promiscuous mode [ 101.655178][ T8474] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.686102][ T8470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.695419][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 101.706756][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.714907][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.722627][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.731080][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.738661][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.761072][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.768504][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.777067][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.787778][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.796812][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.805737][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.815099][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.822286][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.829966][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.838869][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.847376][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.854495][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.869225][ T8472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.878109][ T3396] Bluetooth: hci0: command 0x040f tx timeout [ 101.913839][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 101.923508][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.933163][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.970572][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.010508][ T7] Bluetooth: hci1: command 0x040f tx timeout [ 102.042522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.062090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.078917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.089159][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.105710][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.114373][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.123222][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.132620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.142232][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.150962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.161801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.172176][ T8487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.218745][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.227106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.237125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.247745][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.255967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 102.263712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.272268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.280670][ T5] Bluetooth: hci2: command 0x040f tx timeout [ 102.302260][ T8487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.315069][ T119] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 102.326861][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.348278][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.358579][ T119] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 102.378341][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.387574][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.397878][ T8127] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 102.410834][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 102.452539][ T8474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.477025][ T8472] device veth0_vlan entered promiscuous mode [ 102.487047][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.496091][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.504815][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 102.514764][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.523366][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 102.532441][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.541144][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.548785][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.556911][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.564923][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.582659][ T8470] device veth0_vlan entered promiscuous mode [ 102.617294][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 102.622015][ T8470] device veth1_vlan entered promiscuous mode [ 102.634772][ T8468] device veth0_macvtap entered promiscuous mode [ 102.640565][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 102.651726][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 102.662697][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 102.670888][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 102.678266][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 102.688093][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 102.696358][ T9799] Bluetooth: hci4: command 0x040f tx timeout [ 102.698005][ T8472] device veth1_vlan entered promiscuous mode [ 102.722323][ T8474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.752857][ T8468] device veth1_macvtap entered promiscuous mode 07:20:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x2, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 102.776647][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 102.789804][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.807598][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 102.851834][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 102.869320][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.895264][ T9799] Bluetooth: hci5: command 0x040f tx timeout 07:20:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x2, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 102.968718][ T8470] device veth0_macvtap entered promiscuous mode [ 102.995411][ T8468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 07:20:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x2, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 103.024575][ T8468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.043301][ T8468] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.068080][ T8487] device veth0_vlan entered promiscuous mode [ 103.079314][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 103.088551][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.098466][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.108022][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.117977][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 07:20:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003080)={0x6, 0x4, 0x8, 0x7fff}, 0x40) [ 103.131251][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.139888][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.161697][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.178718][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.192681][ T8470] device veth1_macvtap entered promiscuous mode [ 103.205916][ T8472] device veth0_macvtap entered promiscuous mode [ 103.230090][ T8468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.252000][ T8468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.271318][ T8468] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.291440][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.299534][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.319858][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 103.339228][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.348047][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.358535][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.371070][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.384373][ T8472] device veth1_macvtap entered promiscuous mode [ 103.396948][ T8487] device veth1_vlan entered promiscuous mode [ 103.414935][ T8468] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.424976][ T8468] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.435518][ T8468] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.445318][ T8468] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.460340][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.470534][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 103.501233][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.515242][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.541435][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.562796][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.586342][ T8472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.604015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.622489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.652075][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.671266][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.692686][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.713455][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.727450][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 103.746602][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.771757][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.836275][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.870028][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.889975][ T8472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 103.910648][ T8472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 103.931531][ T8472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.938819][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.960170][ T9770] Bluetooth: hci0: command 0x0419 tx timeout [ 103.968117][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.978830][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.996969][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.009208][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.031676][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.051667][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.069995][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.080808][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.092021][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.100476][ T9799] Bluetooth: hci1: command 0x0419 tx timeout [ 104.103866][ T8470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.120662][ T8470] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.133082][ T8470] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.148339][ T8487] device veth0_macvtap entered promiscuous mode 07:20:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x1, r0}, 0x38) [ 104.179408][ T8472] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.188581][ T8472] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.206641][ T8472] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.219233][ T8472] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.253235][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 104.270584][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.279321][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.310680][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.319316][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.351539][ T9799] Bluetooth: hci2: command 0x0419 tx timeout [ 104.362541][ T8470] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.376263][ T8470] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.385382][ T8470] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.399109][ T8470] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.416108][ T8487] device veth1_macvtap entered promiscuous mode 07:20:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x10003) 07:20:59 executing program 0: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000e00)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f00000009c0)=""/150, 0x96}, {&(0x7f0000001040)=""/137, 0x89}], 0x6, &(0x7f0000000b00)=""/125, 0x7d}, 0x40000061) [ 104.475433][ T8474] device veth0_vlan entered promiscuous mode [ 104.487815][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 104.498420][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.501004][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 104.537567][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.549201][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.558221][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.587401][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.609147][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.620794][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.632111][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.643189][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.655284][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.666188][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 104.688221][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.699879][ C1] hrtimer: interrupt took 64415 ns [ 104.700803][ T8487] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 104.730228][ T9770] Bluetooth: hci4: command 0x0419 tx timeout [ 104.748999][ T8474] device veth1_vlan entered promiscuous mode [ 104.775810][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.788344][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.808003][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.821451][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.831688][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.842419][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.852595][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.863370][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.873545][ T8487] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 104.886174][ T8487] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 104.897966][ T8487] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.947156][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.956457][ T3193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.975336][ T3193] Bluetooth: hci5: command 0x0419 tx timeout [ 104.984527][ T8487] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.995094][ T8487] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.018445][ T8487] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.036099][ T8487] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.116714][ T8474] device veth0_macvtap entered promiscuous mode [ 105.123332][ T44] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.137419][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.143966][ T44] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.147837][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.167171][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 105.175645][ T3396] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 105.198564][ T8474] device veth1_macvtap entered promiscuous mode [ 105.243824][ T191] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.278672][ T191] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.329289][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.340724][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 105.364847][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.376469][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.397500][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.408628][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.419423][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.430416][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.440320][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.451382][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.462115][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 105.472677][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.484381][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 105.495907][ T191] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.513253][ T191] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.522869][ T44] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.524552][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.537422][ T44] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.547979][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.561038][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 105.569110][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 105.626347][ T44] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.628097][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.643297][ T44] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.663260][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.673926][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.685089][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.696113][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.709183][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.720166][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.733010][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.743592][ T8474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 105.754264][ T8474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.765952][ T8474] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 105.793605][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 105.803775][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.815493][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.833977][ T8474] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.843111][ T8474] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.853706][ T8474] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.862649][ T8474] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.895866][ T119] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.912233][ T119] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.952350][ T108] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.970455][ T108] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.978243][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 106.003023][ T119] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 07:21:00 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000e00)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f00000009c0)=""/150, 0x96}, {&(0x7f0000001040)=""/137, 0x89}], 0x6, &(0x7f0000000b00)=""/125, 0x7d}, 0x40000061) [ 106.058878][ T119] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.074829][ T9799] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 106.155970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 106.206625][ T285] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.231237][ T285] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.247992][ T9930] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.332155][ T9930] tc_dump_action: action bad kind 07:21:00 executing program 0: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000e00)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f00000009c0)=""/150, 0x96}, {&(0x7f0000001040)=""/137, 0x89}], 0x6, &(0x7f0000000b00)=""/125, 0x7d}, 0x40000061) 07:21:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@deltaction={0x18, 0x32, 0xf23, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x12}]}, 0x18}}, 0x0) [ 106.459313][ T9771] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 106.551795][ T9947] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.583378][ T9947] tc_dump_action: action bad kind [ 106.597615][ T119] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.617634][ T119] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.664759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:21:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e001d005b0000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='afs_cb_miss\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 07:21:01 executing program 3: socketpair(0x1d, 0x0, 0x7fff, &(0x7f0000002080)) 07:21:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) close(r1) 07:21:01 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000e00)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f00000009c0)=""/150, 0x96}, {&(0x7f0000001040)=""/137, 0x89}], 0x6, &(0x7f0000000b00)=""/125, 0x7d}, 0x40000061) 07:21:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@deltaction={0x18, 0x32, 0xf23, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x12}]}, 0x18}}, 0x0) 07:21:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10, 0x0}, 0x0) 07:21:01 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000000740)) [ 106.843418][ T9963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.846613][ T9964] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 106.871576][ T9963] tc_dump_action: action bad kind 07:21:01 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) 07:21:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@deltaction={0x18, 0x32, 0xf23, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x12}]}, 0x18}}, 0x0) [ 106.993636][ T9964] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 107.093662][ T9985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.122064][ T9985] tc_dump_action: action bad kind 07:21:01 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 07:21:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:01 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x35}, 0x10) 07:21:01 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000e00)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000880)=""/92, 0x5c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000600)=""/85, 0x55}, {&(0x7f00000009c0)=""/150, 0x96}, {&(0x7f0000001040)=""/137, 0x89}], 0x6, &(0x7f0000000b00)=""/125, 0x7d}, 0x40000061) 07:21:01 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e001d005b0000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='afs_cb_miss\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) [ 107.338998][ T9998] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 07:21:01 executing program 3: socketpair(0xa, 0x3, 0xe4, &(0x7f0000000040)) 07:21:01 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) [ 107.415852][ T9998] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 07:21:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e001d005b0000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='afs_cb_miss\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 07:21:02 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000180)) 07:21:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x0, 0x801}, 0x40) 07:21:02 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000ac0)=r6, 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:02 executing program 2: socketpair(0x2c, 0x3, 0xffffffff, &(0x7f0000000040)) [ 107.812298][T10020] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 07:21:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000180)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 107.907561][T10020] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 07:21:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e001d005b0000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='afs_cb_miss\x00', r1}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400086) 07:21:02 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x4040984) 07:21:02 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)='j', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000086c0)={&(0x7f0000008440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008680)=[{&(0x7f00000084c0)=""/173, 0xad}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000088c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:02 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000010000)={&(0x7f000000ff80)=ANY=[@ANYBLOB="9feb010018000000001000000c0000000c"], &(0x7f00000100c0)=""/247, 0x26, 0xf7, 0x1}, 0x20) 07:21:02 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000740)=""/83, 0x53}], 0x1, &(0x7f0000001180)=""/81, 0x51}, 0x0) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:02 executing program 3: socketpair(0x2, 0x801, 0x0, &(0x7f0000000040)) [ 108.189810][T10056] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 108.218259][T10056] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 07:21:02 executing program 0: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000040)) 07:21:02 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)="a1", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f000001b1c0)={0x0, 0x0, 0x0}, 0x0) 07:21:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x40040) 07:21:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x18, 0x4, &(0x7f0000001840)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x20}]}, &(0x7f0000001880)='GPL\x00', 0x1, 0x90, &(0x7f00000018c0)=""/144, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:02 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:02 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f0000002080)) 07:21:02 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x4800) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x1b, 0x0, 0xdd4}, 0x40) 07:21:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:03 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:03 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:03 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001200)={&(0x7f0000000000)="3606513376d1030f60a47c272bda3bb2b832b2ab039245bc4fad7d388e830a11288d475a859c02bb7075ce2f3b908394d3dda988d40f6486115aa0917763a85be42c0e0517ed81051ae612557187386ff3fbd8c7be9a6a6665ef2de8ccd5914e8de302d0862d095278499715ee26659441718e4229f0ce08383e981f53c25136846afe86b8c04d5c2746075bd83a9dfe85068a3f6d1de9c9a620159323349fa256804fcf43d612ea61bdd886108ac7d9fca5eebff3731ab1f4d58535d87525b6aff0619f464befe1296b4c14ad616aea", 0x0, 0x0, 0x0}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x18, 0x4, &(0x7f0000001840)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x20}]}, &(0x7f0000001880)='GPL\x00', 0x1, 0x90, &(0x7f00000018c0)=""/144, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000019c0)={0x5}, 0x10}, 0x78) [ 108.727363][T10101] can: request_module (can-proto-0) failed. 07:21:03 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002240)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000019c40)={&(0x7f0000000280)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000580)="80", 0x1}, {0x0}], 0x2, &(0x7f0000001a40)=ANY=[], 0xa0}, 0x40040c0) [ 108.802975][T10101] can: request_module (can-proto-0) failed. 07:21:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:04 executing program 3: socketpair(0x23, 0x0, 0x0, &(0x7f0000001740)) 07:21:04 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x6) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:04 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1a) 07:21:04 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) 07:21:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:04 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40840) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) write$cgroup_int(r0, 0x0, 0x0) 07:21:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001400)=@bpf_lsm={0x1d, 0x3, &(0x7f0000001240)=@framed, &(0x7f00000012c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 07:21:05 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:05 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:05 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='devices.list\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:06 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="bbdbfc946157e9c2c145410e071ede33f57016a9109006549be02136194f52bad8023fc91e50842d7e18f38e66750370e974ad38c36653b0ee05eb6faa3b6521c840cd7f9b5f87a16c1020c4937caccfa2199d7740007110c3babe29f52c6c9e705623cf7f5117190266ce79d92983d47d4dd4096b832bb507d7422648edced9349eb60f6e8c2fbce3b73b9ffb95a1e73f8966cfbde4cab9339808aa8d458f6013079325a9e2cc6bb21bfd0892c5bd64edef0780da6e33bf5869b04abe37765eaad8e9ecb11f74b1cc64ec033eb246e8892819c98a0c137bcc947e35e42632b523ad3cdcf2b9b70f55a5881439d99f37fc03fe6bbc169e966b1839f732a8aa225b6fe3d94a23cc5a075891b95f8f5787112e45c6ee3a37e4d46d07c05293f9e4c2cc59d57d4673fa38e38d354f57db84ab166f285d", @ANYRES32=r0], 0x138}, 0x4000880) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup/syz1\x00', 0x200002, 0x0) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x18, 0x4, &(0x7f0000001840)=@framed={{}, [@jmp]}, &(0x7f0000001880)='GPL\x00', 0x1, 0x90, &(0x7f00000018c0)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:06 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:06 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="c7", 0xffffff1f}], 0x1}, 0x0) 07:21:06 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000b80)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'streebog256\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="40eb58dd5ac2e6b8d63adfd3ed2a8fded585631866eff65ae134bff79204f56e815fc8155104c36b589a4be24ad796c5d1a3281a20c59f9b567271c037124d6ed983ace941acaca8e6cee73486a685616b3826439593ff36f00435723eb2d3f61406c1d595c7829f6ba63f3f3597842292f289ee1569ac4cc50e4d6efd739fc8b539c2306d3a287bd66e45bc7a401ab1485d0d4fcfa1208176d6975cd70861dc3b243d17a104b170b5d032a7eb475e35b841a99327f257c9c26216aea236ff5d87f17b5e8998854cfe7430591b5b5d9ca4ccc82cf41432b000"/230, 0xe6}, {&(0x7f0000001bc0)="b9f4630d4740771a627bbe4a503778d6f4d177c90066a3e35867a917561601a7f64a858e555f46f908b567f1d39067ac7cb1b7037fe3874df476498d3df3497df27b65b87e4393ea80691a78436a0c0ee25f8501fe3cca6fa07162515e96e49d655f687efdc3d317", 0x68}, {&(0x7f0000001c40)="b01a222a016692f0b7c6df7756cf96ee1f77b23b4ae8e89bfd861b627f333804ce15e1c116065a239594b683b9310699db1d792b6702b308079f8565568ccde0eef703b94051bd2f8f75eb5393adfdfb7141aee61bacb90ec6b0a88f607882bf20cf05d19189a579791b16f57d52115b313bfdcf39b96e3ab2a00342a78f7e623530ecd615f0001de07e0af5e20ac085daa5c731dffa53bdd41fcd3e7256e40028354d6db481314d117144ffd2135124e5cee2433036a669b83a53f9b22c54cbb1569ab4511caec15a9188b0105d5f0a190d7df197c0edb39b", 0xd9}, {&(0x7f0000000900)="7a74145d67bd4f26f158ab48ad5eee6aff60eb878a0d7218fd91b545fd829e7fb53d5acf19f70cf63a9d7441e10ce404be7072589c96d3f864e13a801b46a4b5fdb9e8fcdd16d2936f09e07ba0f2f49dc24848890892813a5c62e8a5fb2c598726e14c265e7bb8d09dd9c3ea1b550e5fe80375088c9a9fea88288543d514d6578bbaf0928f70779feb501ef8c19aa7bd96224eb620e7323d", 0x98}, {&(0x7f0000001e00)=':A\b\x00\x00\x00\x00\x00\x00\x00', 0xa}, {&(0x7f0000001e40)="c2c2a783a45fedc951f5fe7cd6d5f9a10fd7206d5809f9e16427c73bc6f5560f8fec49235ff5a043150ab3bc098a118892f198d351c3e1f9d004ba3c6c43049bb46cf000e3ad7bfc8dd91fab9474b8b162f452ad1fe183040f9af5e5561881ae4ab21b4a5040d853c56f88460ed7b4b8dfe5bbb990eed608cc7b1e36d7c185490cce087f45632681d81ce772252ff8b3", 0x90}, {&(0x7f0000001f00)="02964052dd0c74d7632c2cfe7f7516983d00fecef2aa74037539d05f4f86ea6f98fae4", 0x23}], 0x7, &(0x7f0000001540)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r0], 0x138}, 0x4000880) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:06 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/19, 0x13}], 0x1}, 0x0) 07:21:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:07 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000100)}, 0x20012141) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:07 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:07 executing program 0: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 07:21:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 07:21:07 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000140)={@local, @remote, @val, {@ipv6}}, 0x0) 07:21:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:07 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:07 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000300)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 07:21:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/168, 0xa8) close(r1) 07:21:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:08 executing program 3: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @remote, @val, {@ipv6}}, 0x0) 07:21:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/168, 0xa8) close(r1) 07:21:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:08 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:08 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/168, 0xa8) close(r1) 07:21:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x0, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x0, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001d40)={0x10}, 0x10}], 0x2000000000000212}, 0x0) 07:21:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/168, 0xa8) close(r1) 07:21:09 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x0, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:09 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000c80), 0x4) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:09 executing program 3: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:09 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000400)='id_legacy\x00', 0x0, 0x0) 07:21:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:10 executing program 0: getcwd(&(0x7f0000000100)=""/62, 0x3e) 07:21:10 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 07:21:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0x0, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:10 executing program 3: syz_emit_ethernet(0x26, &(0x7f00000025c0)={@multicast, @remote, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast, {[@generic={0x0, 0x2}]}}}}}}, 0x0) 07:21:10 executing program 0: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) 07:21:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:11 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:11 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0x0, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000040)={0x14, 0x2d, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 07:21:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 07:21:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:11 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:12 executing program 0: add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 07:21:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0x0, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:12 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_delroute={0x2c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfd}, [@RTA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_DST={0x8, 0x1, @multicast1}]}, 0x2c}}, 0x0) 07:21:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:12 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 07:21:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:12 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r2, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') r1 = syz_open_procfs(0x0, &(0x7f0000002300)='cmdline\x00') dup2(r1, r0) 07:21:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:13 executing program 4: socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:13 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, 0x0, r2) 07:21:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7}, 0x38) 07:21:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') r1 = syz_open_procfs(0x0, &(0x7f0000002300)='cmdline\x00') dup2(r1, r0) 07:21:13 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:14 executing program 4: socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:14 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7f, 0x4, "fe6ef06450d48856bcc925ec75eb1e9d547a8aaaccf8e4e14f2eb193bf42ce3393cccccb4acf1f0624d3e3fd5396aa5e70b7f78eefde8cc9c1f5d04743cfae", 0x25}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x4c8d0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, 0x0, 0x0) 07:21:14 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:14 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "56bf44", 0x24, 0x6, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@dstopts, @fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:21:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') r1 = syz_open_procfs(0x0, &(0x7f0000002300)='cmdline\x00') dup2(r1, r0) 07:21:15 executing program 4: socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:15 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) socket$kcm(0x2, 0x8000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r2, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') r1 = syz_open_procfs(0x0, &(0x7f0000002300)='cmdline\x00') dup2(r1, r0) 07:21:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, 0x0, 0x0) 07:21:15 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000000)={@multicast, @remote, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast1}}}}}, 0x0) 07:21:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:15 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') read$FUSE(r0, 0x0, 0x0) 07:21:16 executing program 1: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r2, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r1, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, 0x0, 0x0) 07:21:16 executing program 3: openat$full(0xffffff9c, 0x0, 0x412000, 0x0) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:16 executing program 0: add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 07:21:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:16 executing program 3: r0 = openat$tun(0xffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 07:21:16 executing program 1: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x22462, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x3, 0x0, 0x3, 0x7, 0x80000000, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x3}, {{@in6=@private2}, 0x0, @in6=@empty}}, 0xe4) 07:21:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:16 executing program 3: r0 = openat$uinput(0xffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) 07:21:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:16 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 07:21:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x38) 07:21:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736677c66200088020000400000004f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x152000}], 0x0, &(0x7f0000000080)={[{@uni_xlate='uni_xlate=1'}]}) 07:21:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:16 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) 07:21:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 07:21:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) [ 122.263933][T10665] loop3: detected capacity change from 5408 to 0 [ 122.295571][T10665] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:21:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:16 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) 07:21:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:17 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) 07:21:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 07:21:17 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:17 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) 07:21:17 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) [ 122.704219][T10700] loop3: detected capacity change from 8 to 0 07:21:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:17 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x9, 0x7, 0xdd4, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 07:21:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 123.098683][T10734] loop3: detected capacity change from 8 to 0 [ 123.135653][T10735] loop0: detected capacity change from 8 to 0 07:21:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:17 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f004000000000000003000e00d0000200040000001e010000000000000502000000000000b901000000000000ffffffffffffffff8f0000000000000041010000000000008b01000000000000a7010000000000001a73797a6b616c6c6572203a20001100001a73797a6b616c6c657220000000f3200011000073797a6b616c6c657273b0001d0200ed0100000100911d675f420100604d00ff40005a0000644d00114c002a8d00035d0171298e001a040d00145f000300ff278c004902006d09264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b500012986010200a0007d00294d00074d0009297d00055d0185ce040a002c010001296402dd03012aed00064d028fce0328232ced000229ec00ff000100c027ed0007dc046520544d1b085c001100004800130100a100034d00244c00090200040066696c65304800015002b2013104d404f7050200088003032e636f6c6486590201f906a64001ec080131e20005273100322a3100331100001a001200c10086dd0024dd0048dd00a6dd00e2de001e01bc001100008b0100000000000008805cf90100535f0100af01", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 123.252041][T10747] loop2: detected capacity change from 8 to 0 07:21:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) [ 123.546711][T10759] loop3: detected capacity change from 8 to 0 07:21:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 123.602120][T10767] loop0: detected capacity change from 8 to 0 [ 123.616682][T10778] loop2: detected capacity change from 8 to 0 07:21:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000080)=""/56, 0x200000b8) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 07:21:18 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$netlink(r0, 0x0, 0x0) 07:21:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 123.864891][T10805] loop2: detected capacity change from 8 to 0 [ 123.910171][T10809] loop3: detected capacity change from 8 to 0 07:21:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x42000) read$usbmon(r0, 0x0, 0x0) 07:21:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) [ 123.995575][T10820] loop0: detected capacity change from 8 to 0 07:21:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:18 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[], 0xfffffe70) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:18 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 07:21:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 07:21:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:19 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 07:21:19 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000002700)={0x1f}) 07:21:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:19 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x81, 0x0, "25cf066da4ba7626c1792034f2f3d7c97fce0a"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 07:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001740)=""/102400, 0x19000}], 0x1}, 0x700) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:21:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x81, 0x0, "25cf066da4ba7626c1792034f2f3d7c97fce0a"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 125.478701][T10908] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:21:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x81, 0x0, "25cf066da4ba7626c1792034f2f3d7c97fce0a"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 07:21:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x6, 0x1, 0x3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000000)={r1}) 07:21:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x81, 0x0, "25cf066da4ba7626c1792034f2f3d7c97fce0a"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 07:21:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f620"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:20 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000180)=ANY=[], 0x1001) 07:21:20 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x6, 0x1, 0x3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000000)={r1}) 07:21:21 executing program 2: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:21:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, 0x0, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:21 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "e9433d320ba75b43ab8e23ffd8fcd051afa3193c372bcf3cc5eb36379698d68646970f0569e8b85eb28b28c9af5c041e06cce6ccd5d81dc587363193afbf5b9226d633dc"}, 0xfffffe70) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 07:21:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x6, 0x1, 0x3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000000)={r1}) 07:21:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:21 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)={'veth0_to_team'}, 0x10) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "e9433d320ba75b43ab8e23ffd8fcd051afa3193c372bcf3cc5eb36379698d68646970f0569e8b85eb28b28c9af5c041e06cce6ccd5d81dc587363193afbf5b9226d633dc"}, 0xfffffe70) 07:21:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000080)={0x6, 0x1, 0x3, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000000)={r1}) 07:21:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b020"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) 07:21:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) 07:21:22 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x4c}}, 0x0) 07:21:22 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000200)=ANY=[], 0xfffffe70) write$eventfd(r0, &(0x7f0000000000), 0x8) 07:21:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) 07:21:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, 0x0, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_targets\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) 07:21:22 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) pipe(0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 07:21:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x4}) 07:21:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00', 0x1) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='z', 0x1}], 0x1, &(0x7f0000002180)=[{0x10}], 0x10}}], 0x1, 0x0) [ 128.706115][T11093] "syz-executor.0" (11093) uses obsolete ecb(arc4) skcipher 07:21:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x26}, 0x14}}, 0x0) 07:21:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) 07:21:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00', 0x1) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='z', 0x1}], 0x1, &(0x7f0000002180)=[{0x10}], 0x10}}], 0x1, 0x0) [ 129.156046][T11125] "syz-executor.0" (11125) uses obsolete ecb(arc4) skcipher 07:21:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, 0x0, 0xc000) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:23 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={0x0}}, 0x0) 07:21:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00', 0x1) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='z', 0x1}], 0x1, &(0x7f0000002180)=[{0x10}], 0x10}}], 0x1, 0x0) 07:21:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) [ 129.439652][T11142] "syz-executor.0" (11142) uses obsolete ecb(arc4) skcipher 07:21:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:21:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) 07:21:24 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)='\x00', 0x1) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)='z', 0x1}], 0x1, &(0x7f0000002180)=[{0x10}], 0x10}}], 0x1, 0x0) 07:21:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 129.672405][T11165] "syz-executor.0" (11165) uses obsolete ecb(arc4) skcipher 07:21:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000007340)=[{{&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000002200)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x2, &(0x7f0000007500)) 07:21:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) 07:21:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0xb) r1 = dup(r0) sendto$inet(r1, &(0x7f0000001280)="06", 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) recvfrom(r0, 0x0, 0x0, 0x400c2, 0x0, 0x0) 07:21:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc337600363940", 0xf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x7) 07:21:24 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000001240)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x14}, 0x14}}, 0x0) 07:21:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000380)='GPL\x00', 0x101, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500), 0x10}, 0x78) 07:21:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:25 executing program 2: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000005c80)='/dev/dlm-control\x00', 0x3, 0x0) 07:21:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:25 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) 07:21:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:25 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 131.224338][T11256] binder: 11253:11256 ioctl c018620c 0 returned -14 07:21:27 executing program 0: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000280)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 07:21:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:27 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$inet(r0, 0x0, 0x0, 0x40002123, 0x0, 0x0) 07:21:27 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001780)) 07:21:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f00000000c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="6873717307000000911d675f00400000000000ed02000e00d000020004", 0x1d}, {0x0, 0x0, 0x7fff}], 0x0, &(0x7f00000003c0)=ANY=[]) 07:21:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/snmp6\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x40010000) 07:21:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 07:21:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x800000}, 0x0, 0x800000, 0xd, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 133.762772][T11299] loop3: detected capacity change from 127 to 0 [ 133.787976][T11299] Filesystem uses "lzma" compression. This is not supported 07:21:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f00000000c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="6873717307000000911d675f00400000000000ed02000e00d000020004", 0x1d}, {0x0, 0x0, 0x7fff}], 0x0, &(0x7f00000003c0)=ANY=[]) 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x40010000) 07:21:28 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 07:21:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 07:21:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x800000}, 0x0, 0x800000, 0xd, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 07:21:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r2, 0x542f, 0x0) [ 133.997579][T11326] loop3: detected capacity change from 127 to 0 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x40010000) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 134.069241][T11326] Filesystem uses "lzma" compression. This is not supported 07:21:28 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000001200)=""/131, 0x83}], 0x6, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x800000}, 0x0, 0x800000, 0xd, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 07:21:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 07:21:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f00000000c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="6873717307000000911d675f00400000000000ed02000e00d000020004", 0x1d}, {0x0, 0x0, 0x7fff}], 0x0, &(0x7f00000003c0)=ANY=[]) [ 134.265197][T11353] loop2: detected capacity change from 8 to 0 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x800000}, 0x0, 0x800000, 0xd, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 07:21:28 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) [ 134.426142][T11366] loop3: detected capacity change from 127 to 0 [ 134.444023][T11366] Filesystem uses "lzma" compression. This is not supported 07:21:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7baf48e6d2885a09a87507ebf4e43bc0609b199b6ed90e0ebcdac5f7a860c00269c781f6428457253e89ad528d985636a86ec0f60f5a6d1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81070545cab5d5b0d7ff0575cc2727e8d974927676468ff2d8621c3ac94712ed9cf6b40b3cf252a47c05af3a30d57cc3ed67d1867b54d24e2da18568c3b0f24b52616bf84d3b042d6e432cd0e3b57239f0127473e6ba922aff649609d40b47ec331ccba3ce8d530ffff19a6471bf3abc742d9cbcfb964b13831034694a6aad86cf08a2c7b2235dc99de9aa3e6b77c7a2877261ed72da90864987f30926c9013eec3b86836ae504479f60b0ec9204d2b85627aa5a79f670000000000000000000000008f02712c3d8fc4e2686e21a855e823887196d4f4e9f2013d2aef4a3b5092be4d6852b88317c5adbbdb0015f89e9939bc424d1bafe5725c8a4047b91da3768c1ca6a4410009f95d4ba21068285afa8d3b4a6893d3626ab5becbcdb887af2c85c2d9ab09b5dd7d3c4406d2d7650bf7b2ff4602aec1eea200000064881c560c371a08e051374cf05c921a06fb78183e7e68de9dabe35f1a5d50f20209eec6eb2c510b2cc8d95e4e5b365d1e125bf7e1680bafd8e95b760698f431432010e100c9cb9973415dbe4566cda69cf8bfdf2aa2ba077fe30b9dea3f0722ec0cc12037b3263101fb0f42a759e16b963637a20199962cf2e4b9dcc56d495a925f7c4f3b411985969392dcdc605b88a1a845f6f178b356ce2ca67c18a7f364827d284a338c7b2703d609e50606f4f6205607031b313f99881d5a592844eff54a1567886382b0202bc9adb1492e4a1c31b07383baaa9e3a3d0bb749a8b065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:29 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 07:21:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f00000000c0)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="6873717307000000911d675f00400000000000ed02000e00d000020004", 0x1d}, {0x0, 0x0, 0x7fff}], 0x0, &(0x7f00000003c0)=ANY=[]) 07:21:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) 07:21:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 134.688442][T11393] loop2: detected capacity change from 8 to 0 07:21:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) 07:21:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x10000, &(0x7f0000000040)) [ 134.730716][T11396] loop3: detected capacity change from 127 to 0 07:21:29 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) [ 134.801183][T11396] Filesystem uses "lzma" compression. This is not supported 07:21:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="b91803b700030703009e40f005dd1fff060000000000008477fbac141423e0000301c699da153f15e0e6e380f6010bf683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000002fc0)=""/4096, 0x1000}], 0x5, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) 07:21:29 executing program 3: syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="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", 0x1bb}, {0x0, 0x0, 0x7fff}, {&(0x7f0000000080)="bbe5fb1acd3ae8d03ff8bb86bf0ed732698d246ec7a79a", 0x17, 0x7a}], 0x0, &(0x7f00000003c0)=ANY=[]) [ 134.997931][T11419] loop2: detected capacity change from 8 to 0 07:21:29 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x10, 0x0, 0x8020001) 07:21:29 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1bb}], 0x0, &(0x7f00000003c0)=ANY=[]) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) 07:21:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}, {&(0x7f0000000800)=""/35, 0x23}], 0x4, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x6, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) [ 135.270254][T11437] loop3: detected capacity change from 127 to 0 [ 135.305591][T11441] loop2: detected capacity change from 8 to 0 [ 135.341215][T11437] ================================================================== [ 135.349569][T11437] BUG: KASAN: slab-out-of-bounds in squashfs_get_id+0x116/0x250 [ 135.357228][T11437] Read of size 8 at addr ffff888020cb1e40 by task syz-executor.3/11437 [ 135.365492][T11437] [ 135.367909][T11437] CPU: 0 PID: 11437 Comm: syz-executor.3 Not tainted 5.11.0-rc3-syzkaller #0 [ 135.376672][T11437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.386714][T11437] Call Trace: [ 135.389984][T11437] dump_stack+0x183/0x22e [ 135.394306][T11437] ? show_regs_print_info+0x12/0x12 [ 135.399488][T11437] ? log_buf_vmcoreinfo_setup+0x45d/0x45d [ 135.405207][T11437] ? _raw_spin_lock_irqsave+0xbf/0x100 [ 135.410667][T11437] ? _raw_spin_lock+0x40/0x40 [ 135.415418][T11437] print_address_description+0x5f/0x3b0 [ 135.420950][T11437] kasan_report+0x15e/0x200 [ 135.425450][T11437] ? squashfs_get_id+0x116/0x250 [ 135.430392][T11437] squashfs_get_id+0x116/0x250 [ 135.435140][T11437] ? asan.module_ctor+0x10/0x10 [ 135.439983][T11437] squashfs_read_inode+0x2a7/0x2970 [ 135.445174][T11437] ? squashfs_iget+0xf0/0xf0 [ 135.449837][T11437] ? new_inode+0x1be/0x1d0 [ 135.454242][T11437] ? do_raw_spin_unlock+0x134/0x8a0 [ 135.459428][T11437] ? _raw_spin_unlock+0x24/0x40 [ 135.464347][T11437] ? new_inode+0x1be/0x1d0 [ 135.468751][T11437] squashfs_fill_super+0x1668/0x1c60 [ 135.474037][T11437] get_tree_bdev+0x406/0x630 [ 135.478610][T11437] ? squashfs_reconfigure+0xa0/0xa0 [ 135.483791][T11437] vfs_get_tree+0x86/0x270 [ 135.488188][T11437] path_mount+0x1937/0x2c50 [ 135.492683][T11437] ? mark_mounts_for_expiry+0x520/0x520 [ 135.498400][T11437] ? getname_flags+0x1fe/0x640 [ 135.503150][T11437] __se_sys_mount+0x2f9/0x3b0 [ 135.507814][T11437] ? __x64_sys_mount+0xc0/0xc0 [ 135.512568][T11437] ? __x64_sys_mount+0x1c/0xc0 [ 135.517340][T11437] do_syscall_64+0x2d/0x70 [ 135.521741][T11437] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.527619][T11437] RIP: 0033:0x460c6a [ 135.531497][T11437] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 135.551281][T11437] RSP: 002b:00007fde9571ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 135.559678][T11437] RAX: ffffffffffffffda RBX: 00007fde9571bb10 RCX: 0000000000460c6a [ 135.567633][T11437] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007fde9571bad0 [ 135.575585][T11437] RBP: 00007fde9571bad0 R08: 00007fde9571bb10 R09: 0000000020000040 [ 135.583623][T11437] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000040 [ 135.591690][T11437] R13: 0000000020000100 R14: 0000000020000440 R15: 00000000200003c0 [ 135.599657][T11437] [ 135.601962][T11437] Allocated by task 8474: [ 135.606266][T11437] ____kasan_kmalloc+0xbd/0xf0 [ 135.611010][T11437] __kmalloc_node+0x24f/0x3e0 [ 135.615667][T11437] __vmalloc_node_range+0x51b/0x890 [ 135.620844][T11437] vzalloc+0x75/0x80 [ 135.624829][T11437] __do_replace+0xc2/0xab0 [ 135.629338][T11437] do_ip6t_set_ctl+0x2c9e/0x3d10 [ 135.634266][T11437] nf_setsockopt+0x29f/0x2d0 [ 135.638843][T11437] ipv6_setsockopt+0x3d66/0x5730 [ 135.643762][T11437] __sys_setsockopt+0x552/0x990 [ 135.648707][T11437] __x64_sys_setsockopt+0xb1/0xc0 [ 135.653758][T11437] do_syscall_64+0x2d/0x70 [ 135.658157][T11437] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.664032][T11437] [ 135.666338][T11437] Freed by task 8474: [ 135.670301][T11437] kasan_set_track+0x3d/0x70 [ 135.674871][T11437] kasan_set_free_info+0x1f/0x40 [ 135.679800][T11437] ____kasan_slab_free+0xe2/0x110 [ 135.684820][T11437] slab_free_freelist_hook+0xd6/0x1a0 [ 135.690175][T11437] kfree+0xd1/0x2a0 [ 135.693976][T11437] __vunmap+0x9b3/0xa60 [ 135.698119][T11437] __do_replace+0x850/0xab0 [ 135.702616][T11437] do_ip6t_set_ctl+0x2c9e/0x3d10 [ 135.707551][T11437] nf_setsockopt+0x29f/0x2d0 [ 135.712145][T11437] ipv6_setsockopt+0x3d66/0x5730 [ 135.717076][T11437] __sys_setsockopt+0x552/0x990 [ 135.721932][T11437] __x64_sys_setsockopt+0xb1/0xc0 [ 135.726936][T11437] do_syscall_64+0x2d/0x70 [ 135.731333][T11437] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.737211][T11437] [ 135.739528][T11437] The buggy address belongs to the object at ffff888020cb1e38 [ 135.739528][T11437] which belongs to the cache kmalloc-8 of size 8 [ 135.753302][T11437] The buggy address is located 0 bytes to the right of [ 135.753302][T11437] 8-byte region [ffff888020cb1e38, ffff888020cb1e40) [ 135.766734][T11437] The buggy address belongs to the page: [ 135.772349][T11437] page:0000000004d05cd2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20cb1 [ 135.782481][T11437] flags: 0xfff00000000200(slab) [ 135.787322][T11437] raw: 00fff00000000200 ffffea0005054340 0000000200000002 ffff888010841c80 [ 135.795885][T11437] raw: 0000000000000000 0000000000660066 00000001ffffffff 0000000000000000 [ 135.804476][T11437] page dumped because: kasan: bad access detected [ 135.810864][T11437] [ 135.813171][T11437] Memory state around the buggy address: [ 135.818782][T11437] ffff888020cb1d00: fc fc fc fc fa fc fc fc fc fa fc fc fc fc fa fc [ 135.826819][T11437] ffff888020cb1d80: fc fc fc fa fc fc fc fc fa fc fc fc fc 00 fc fc [ 135.834855][T11437] >ffff888020cb1e00: fc fc fa fc fc fc fc fa fc fc fc fc fa fc fc fc 07:21:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000580)=""/60, 0x3c}], 0x3, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:30 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 07:21:30 executing program 2: r0 = openat$hwrng(0xffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) [ 135.842901][T11437] ^ [ 135.849049][T11437] ffff888020cb1e80: fc fa fc fc fc fc fa fc fc fc fc fa fc fc fc fc [ 135.857101][T11437] ffff888020cb1f00: fa fc fc fc fc fa fc fc fc fc fa fc fc fc fc fa [ 135.865148][T11437] ================================================================== [ 135.873192][T11437] Disabling lock debugging due to kernel taint 07:21:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 07:21:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000c80), 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}, {&(0x7f0000000200)=""/20, 0x14}], 0x2, &(0x7f0000000e80)=""/145, 0x91}, 0x40010000) 07:21:30 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) [ 135.951426][T11456] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 136.052013][T11437] Kernel panic - not syncing: panic_on_warn set ... [ 136.059586][T11437] CPU: 1 PID: 11437 Comm: syz-executor.3 Tainted: G B 5.11.0-rc3-syzkaller #0 [ 136.069713][T11437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.079744][T11437] Call Trace: [ 136.083000][T11437] dump_stack+0x183/0x22e [ 136.087413][T11437] ? log_buf_vmcoreinfo_setup+0x45d/0x45d [ 136.093124][T11437] ? show_regs_print_info+0x12/0x12 [ 136.098298][T11437] ? trace_hardirqs_on+0x30/0x80 [ 136.103215][T11437] panic+0x2e1/0x850 [ 136.107091][T11437] ? trace_hardirqs_on+0x30/0x80 [ 136.112005][T11437] ? nmi_panic+0x90/0x90 [ 136.116237][T11437] ? preempt_schedule_thunk+0x16/0x18 [ 136.121599][T11437] ? trace_hardirqs_on+0x30/0x80 [ 136.126516][T11437] kasan_report+0x1fb/0x200 [ 136.131002][T11437] ? squashfs_get_id+0x116/0x250 [ 136.135917][T11437] squashfs_get_id+0x116/0x250 [ 136.140657][T11437] ? asan.module_ctor+0x10/0x10 [ 136.145489][T11437] squashfs_read_inode+0x2a7/0x2970 [ 136.150672][T11437] ? squashfs_iget+0xf0/0xf0 [ 136.155244][T11437] ? new_inode+0x1be/0x1d0 [ 136.159638][T11437] ? do_raw_spin_unlock+0x134/0x8a0 [ 136.164830][T11437] ? _raw_spin_unlock+0x24/0x40 [ 136.169652][T11437] ? new_inode+0x1be/0x1d0 [ 136.174042][T11437] squashfs_fill_super+0x1668/0x1c60 [ 136.179303][T11437] get_tree_bdev+0x406/0x630 [ 136.183869][T11437] ? squashfs_reconfigure+0xa0/0xa0 [ 136.189039][T11437] vfs_get_tree+0x86/0x270 [ 136.193429][T11437] path_mount+0x1937/0x2c50 [ 136.197911][T11437] ? mark_mounts_for_expiry+0x520/0x520 [ 136.203432][T11437] ? getname_flags+0x1fe/0x640 [ 136.208183][T11437] __se_sys_mount+0x2f9/0x3b0 [ 136.212925][T11437] ? __x64_sys_mount+0xc0/0xc0 [ 136.217679][T11437] ? __x64_sys_mount+0x1c/0xc0 [ 136.222418][T11437] do_syscall_64+0x2d/0x70 [ 136.226824][T11437] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.232702][T11437] RIP: 0033:0x460c6a [ 136.236576][T11437] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 136.256255][T11437] RSP: 002b:00007fde9571ba78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 136.264651][T11437] RAX: ffffffffffffffda RBX: 00007fde9571bb10 RCX: 0000000000460c6a [ 136.272782][T11437] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007fde9571bad0 [ 136.280728][T11437] RBP: 00007fde9571bad0 R08: 00007fde9571bb10 R09: 0000000020000040 [ 136.288762][T11437] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000040 [ 136.296715][T11437] R13: 0000000020000100 R14: 0000000020000440 R15: 00000000200003c0 [ 136.305309][T11437] Kernel Offset: disabled [ 136.309625][T11437] Rebooting in 86400 seconds..