ting program 1: openat$vga_arbiter(0xffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101480, 0x0) 08:35:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010f000000000000000001"], 0x3c}}, 0x0) 08:35:19 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f00000003c0)="b6720b", 0xffffffffffffff0b}, {&(0x7f0000000200)="3d0a6005c937e378637ec67c1b93752203a700192f876336b4f5b9bb2455738be07cb16cdc20ae8e22990e20923b78f7e4b6305950b93f8faf28428a487e7cb8973ea4d4e54f14a2f3fa64f63736a41c4600d8b423aac9c5e4f6aa941248f800adf52fb9f19546e26b48e51df1c29551e35341367ecf42080d551bb02417b160cc72c5673443efc0cfb928c21595b947", 0x90, 0x40}, {&(0x7f00000000c0)="0cd1f7d86091e650a9d8c67deb340581c18163e445e6d075f68a197a8c41c172b4c7fdb6204f3f71f95d97ac12b182160499c44dde6861ee4e9c53a7567c25a30dd77dc9cdf8ec3a84ba1bdbdeb4bb938a2a790c186b22507c093a31bf40efef910c19813986049930b7ff439bb2c7de80d4de63e3cc9b2708f630d51a81fcbf1f02491dbd7e54471fdf443fab64de092739935e56ce30c9ec78333464f0cb345442a94626ddeff0c7352654b00d123c0b53688d8635c7c54bdfe0d1bd6267339a7814f444416b0e9b09759b798bd4008528febfd1edb5818db3843aa0", 0xdd, 0x8001}]) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) 08:35:19 executing program 5: r0 = eventfd2(0x6, 0x801) read$eventfd(r0, &(0x7f0000000040), 0x8) 08:35:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 08:35:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, r1, 0x17, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 08:35:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000012c0)) 08:35:19 executing program 1: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2286, 0x816d000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 08:35:19 executing program 5: r0 = openat$cuse(0xffffff9c, &(0x7f00000020c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002400)={0x26, 0x3, 0x0, {0x0, 0x5, 0x0, '*.!&-'}}, 0x26) 08:35:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x144, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:19 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, 0x0) 08:35:19 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=@framed={{}, [@exit, @generic={0xfc}, @func]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:19 executing program 4: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xffffffff, 0x0) 08:35:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x16, 0x0, 0x96b, 0x2, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 08:35:19 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', r1) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000bc0)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) 08:35:19 executing program 1: openat$kvm(0xffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x6b4c80, 0x0) 08:35:19 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) syz_read_part_table(0xfffffe00, 0x1555555555555594, &(0x7f0000000140)=[{&(0x7f0000000040)="1dd63a99ea452e1125545ffc5e7e43aba2bb5895a9004939fced9e4b2ad899e81e84a785e0e4458dcf0b24e64f925cd32989796ace0fbfadb6ece4cf50f5085469e85a981580d133157579aa6c8ab0d5a187dfa060cba4047daaf1a5a11b6bd693b04d54f51d2c8e18acdcc29ba4f24059bf02256393f230768d0d2a45855c3b0ee1f2857900d919afd2fc", 0x0, 0x6}, {&(0x7f0000002700)="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", 0x0, 0x203}]) 08:35:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x16, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x40) 08:35:19 executing program 4: openat$kvm(0xffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) 08:35:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x46, &(0x7f00000003c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x10, 0x11, 0x0, @private0, @mcast2, {[], {0x0, 0xe22, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 08:35:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x145, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r0) 08:35:20 executing program 4: mknodat(0xffffffffffffffff, 0x0, 0x4109, 0x0) 08:35:20 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000001680)=[{&(0x7f0000001380)="fdec4e715fdf133b613647846ea98672f28ea9b64dea490d424bb9a393ef12cdd5eac9b71a1ca128b41f6b4d6fdba57b05c65eb837b39c45bad914a13fdf148b5b6ee26a301da7f00ef0bd76ab5c4805e89f01cc860a368486ab075f6cf5018e5586d9f93f900f6994cc5fe7b9749c8f3d97c5516f3f9a2119a9f40eac826cfc3c", 0x81}]) syz_read_part_table(0x0, 0x15555555555555da, &(0x7f0000001240)=[{&(0x7f0000000000)="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", 0x0, 0x3}, {&(0x7f0000001000)="34d54a360434738266eb8a4c261f24a77eae97df96b71ab366f6607b2a9c88b0c7383a3f51efd434e504eda309466835052af3c978096107b726ca553976d2c264f911013f1605740c41764240a77aeb0fc904ae119c39a20c4fe2e050d99e2038c3e514c82c2ac3f871774b48c05884d7ea48750d50ad2d6b57e6df8cc8eeec04477b09fa6adf2116034db8b33a1746019d301f7d1659561322a93f0da3e0edf5aa75b734b2785cd1cffc9f59fcc88d7b923c4db61883102a3daeee116461", 0x0, 0xfff}, {&(0x7f00000010c0)="212b7e82217d7542d1e8fc86b28065b4c0060f6b5d9c4bffbc4fd9bd0acde666409ef6caba259c0880cac4aed0c3355ffd5a0046551c019f8371457fb8c6bf750d1d68765d8ae683150f24efdacb32ed782ce1038f0f193f3be079922bc8c90069828ab5", 0x0, 0x2}, {&(0x7f0000001140)="60fdf721fc9a8436b069d5153d770a0ebbae96c96772cede92f28042dfbe2fc0a80899399358de3e622b5a389d2764df1807fcc173f897c5e4263d7d988e2a352e2fff6e0e255a6c77a5fb768017a5a33f625197ecca923bd4490771fe395f5ffdebd30cf1cfcfd05388b9302fac751ecc7b95a20e03851a7f995de8a87df33a4ec38bc48667a4097f63f0a73524ee721322797e0778738b8dd285c71d13f25ca7ce2a462a91bba4615967bf0b4831b8024674983312c2cd6ae1633a7b863e6af038d03a06ed27ceb67c2981591224a9c6902a37f899965c4524b17a5ae90f7f2322a9201f3a2071", 0x0, 0x8}]) 08:35:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, 0x0, 0x0) 08:35:20 executing program 4: pipe(&(0x7f0000000500)) 08:35:20 executing program 5: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x8000, 0x200000) 08:35:20 executing program 2: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x1) syz_read_part_table(0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="8bd3c983303e6eeaf047c4d7264454c051f63fca858e830b8d1aab91c9714a4b59dc677ef3ba474ba57c25e9ab98e5374b2e8374735286f27a31372b3c6d055abc0282d4c1aa81dc01cafda6d8b5a1ba3f42b748a676859d44ee1e1435eb4aa9d88192a0ed7eb939fd321d25caefff6ba4943eeb724f5c6cf74c90e6b44a671bea8b178c0325dd4fd680fac8d2a1aeea", 0x90, 0x1f}, {&(0x7f00000001c0)="bd2757dea204d87aa751a3f4ac1247f772f26d0898d1858b6ce36fa9ddff1fec9c229954b90503db392cf7ed4703f69f36d88474e9072b0dbd25d5046b40a3c21f0f5c9dded4fb63", 0x48, 0x7}]) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x47}}, 0x4000080) syz_read_part_table(0xa4b, 0x4, &(0x7f00000006c0)=[{&(0x7f00000003c0)="b6720bf6dcc9bbbe96f455f998aa56607528bcedafe1cdd5acbbd0bef989e30692f13923240aed72acb3dc774f14ab083aea198d3ee5d30d7daf37f1eabf2b45a9a1dbb4471a22003d8d721044c7d19010333a1d45e7fdd508977099fdcef2e6f813b2ebc5a46d6f3f3ae1d574e24dd9b1afc99e43f6a518f7c893532a2ba382989c994bd94e1ed7f00c3099307cbd42cb29b02b8523d864e8f2ccd88a7622a91996000806dcf04f7815c90e8bcd834d14ed", 0xb2, 0x2}, {&(0x7f0000000480)="c23d06703aa7bb3c20c83a281f7d3c490e9b1aad28d28a16a9ba15eb166ccceab10ea5320a60ce400a1f9fddda926dd3f9b8f687af68f06e715049a37438addfc1bac3bd620af0f5c4bea008c595d69ed05f304ff35ed9c170d03c30d4279d554cc0508b03d7567dba2dac774d515f69bb5678b167d15d2871bec1ffb4fad9", 0x7f, 0x332}, {&(0x7f0000000500)}, {&(0x7f0000000600)="e03cd16c0775335511e2ea81c3e0216dcbd16bee8fd61b0c70dc65aec06b05e40e44a6a1b71d655de0979c8a61416647d89444b948a8005e9e297e4fc7deffe615759deb3d27c28d48df646f02786f3359429d7d551c81d0fdd75261795445bb61454d5db0ab6ed656dc90129564e7beb4d7a3f9c61292e9680fc5732f9cf9bbfa8de6885ea20fa0cf209a803d2f8a1d245e713f672818da6019dac714ddafd4d78b5d9bb7407cb75cc38e92a98ea98ed4de08addc9f986a7ba0a60f5fce01", 0xbf, 0x6}]) socketpair(0x1, 0x4, 0x7, &(0x7f0000000700)) 08:35:20 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x202000, 0x0) 08:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000066e601"], 0x2c}}, 0x0) 08:35:21 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=@framed={{}, [@exit, @generic={0xfc}, @func]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:21 executing program 2: write$vga_arbiter(0xffffffffffffffff, 0x0, 0x0) 08:35:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x146, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:21 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 08:35:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x5c}}, 0x0) 08:35:21 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='Q', 0x1, 0xfffffffffffffff8) 08:35:21 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x1008085, &(0x7f0000000040)={[{@fat=@check_normal='check=normal'}, {@fat=@discard='discard'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 08:35:21 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{0x0}]) 08:35:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x147, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000100)={'wpan4\x00'}) 08:35:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000002580), 0x0, &(0x7f0000002600)={[{@fat=@sys_immutable='sys_immutable'}, {@fat=@codepage={'codepage', 0x3d, '1255'}}]}) 08:35:21 executing program 2: r0 = openat$cuse(0xffffff9c, &(0x7f00000020c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000002100)={0x18, 0x3}, 0x18) 08:35:21 executing program 4: read$FUSE(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)={[{@fat=@tz_utc='tz=UTC'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100000000}}]}) 08:35:21 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfffffff8, 0x10ba00) 08:35:21 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002200)=[{&(0x7f0000001180)=""/4113, 0x1011}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='maps\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0, 0x0) 08:35:21 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', r0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) 08:35:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x2, 0x8c, &(0x7f0000000140)=""/140, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) 08:35:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000001980)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001940)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_PMSR_ATTR_PEERS={0xea8, 0x5, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x148, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0xd4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x1e4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x15c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x88, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xcc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x528, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x238, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xb4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x29c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}]}, {0x180, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xb8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x58, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}, {0x478, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1c4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x70, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x284, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xbc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xcc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x14, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}]}]}]}]}, 0xec4}}, 0x0) 08:35:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x148, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:22 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000680)=[{}], 0x1, 0x2) 08:35:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x8c, &(0x7f0000000140)=""/140, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 08:35:22 executing program 5: openat$kvm(0xffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200800, 0x0) 08:35:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x4}]}, 0x18}}, 0x0) 08:35:22 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{0x0}]) syz_read_part_table(0xa4b, 0x2, &(0x7f00000006c0)=[{0x0}, {0x0, 0x0, 0x332}]) socketpair(0x0, 0x0, 0x0, &(0x7f0000000700)) 08:35:22 executing program 5: ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{0x662, 0xffff, 0x2, 0xfd, 0x80, 0x4, 0x9a, 0x1, 0x3, 0x0, 0x3, 0x6, 0x251}, {0x0, 0x8a7, 0x1, 0x0, 0x4, 0x0, 0x80, 0x0, 0x0, 0xf1, 0x8, 0x8}, {0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20, 0x0, 0x0, 0x5}], 0x5d}) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) fchmod(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) listen(r1, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x2e1) 08:35:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c"], 0x3c}}, 0x0) 08:35:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:22 executing program 1: setresgid(0x0, 0xee01, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 08:35:22 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @void}}}]}) [ 857.263770] Dev loop4: unable to read RDB block 5 [ 857.269216] loop4: unable to read partition table [ 857.292031] loop4: partition table beyond EOD, truncated [ 857.323625] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 08:35:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x149, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:22 executing program 2: r0 = openat$bsg(0xffffff9c, &(0x7f00000020c0)='/dev/bsg\x00', 0x0, 0x0) statx(r0, &(0x7f0000000500)='./file1\x00', 0x1000, 0x0, &(0x7f0000000540)) 08:35:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001500)={&(0x7f0000000000)=@alg, 0x80, 0x0}, 0x2002) 08:35:22 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000011c0)=[{0x0, 0x0, 0x2ac2}, {&(0x7f00000001c0)="32ef1f016c0669aeb2b7a03ff2f6f8cc", 0x10, 0x1}], 0x1008085, &(0x7f0000001440)) 08:35:22 executing program 4: socketpair(0x0, 0x2089cbceb1bec614, 0x0, 0x0) 08:35:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 08:35:22 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x20, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_SOPASS={0xb, 0x3, "04eb532f4a42db"}]}, 0x20}}, 0x0) 08:35:23 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 08:35:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=@framed={{}, [@exit, @exit, @func]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000037c0)={'team0\x00'}) 08:35:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000e476e6f6f6b9271e2e8f9b"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_flags}}) 08:35:23 executing program 2: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 08:35:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r3, 0x407, 0x2200005) splice(r2, 0x0, r3, 0x0, 0x800fff, 0x0) 08:35:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x4, 0x0, 0x0, 0x3}, 0x10}, 0x74) 08:35:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 08:35:23 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000003c0)="b6", 0x1, 0x1100}]) 08:35:23 executing program 4: r0 = openat$kvm(0xffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200800, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 08:35:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000002040)={[{@fat=@showexec='showexec'}]}) 08:35:23 executing program 4: openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) 08:35:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000200)=@framed={{}, [@exit, @generic={0xfc}, @func]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x74) 08:35:23 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00', r0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c09425, &(0x7f0000000000)={"224b486a576f59659013d163b8f5e3ad", 0x0, 0x0, {0xfffffffffffffff9, 0x1}, {0x49c}, 0x4d5a, [0x1f, 0x2, 0x7, 0x101, 0x200, 0x7f, 0x6, 0x97ad, 0x7ff, 0xfff, 0x7, 0x80000000, 0x3f, 0x7, 0x800, 0x401]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81e8943c, &(0x7f00000000c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) mkdirat$cgroup_root(0xffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c09425, &(0x7f0000000300)={"352e4d7f5c7c0d6fc489694e5c10e4a7", r2, r3, {0x25, 0xa75}, {0x0, 0x8}, 0x3, [0x1, 0x8, 0x2, 0xcc, 0x45, 0x51176351, 0x9, 0x5, 0x8, 0x9, 0x1c, 0xfff, 0x7, 0x8108, 0xefce, 0x8]}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000400), 0x8) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000440)=0x1000) 08:35:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000980), 0x0, &(0x7f0000000a00)={[{@fat=@quiet='quiet'}, {@fat=@gid={'gid', 0x3d, 0xee00}}]}) 08:35:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x34}}, 0x0) 08:35:24 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 08:35:24 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00'}) r0 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', 0xffffffffffffffff) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, r0, 0x4, 0x0, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008814}, 0x80) 08:35:24 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) 08:35:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x4, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x23}, 0x0) 08:35:24 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 08:35:24 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, &(0x7f00000006c0)) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x40840) 08:35:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:35:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x12, 0x4) 08:35:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', r0) 08:35:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1fffffff00000000000001"], 0x3c}}, 0x0) 08:35:24 executing program 1: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 08:35:24 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f00000006c0)=[{&(0x7f00000003c0)="b6720b", 0xfffffdef}]) 08:35:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:24 executing program 5: syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00', 0xffffffffffffffff) 08:35:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:25 executing program 1: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, 0x0, 0x0) 08:35:25 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f00000003c0)="b6720b", 0xffffffffffffff0b}, {&(0x7f0000000200)="3d0a6005c937e378637ec67c1b93752203a700192f876336b4f5b9bb2455738be07cb16cdc20ae8e22990e20923b78f7e4b6305950b93f8faf28428a487e7cb8973ea4d4e54f14a2f3fa64f63736a41c4600d8b423aac9c5e4f6aa941248f800adf52fb9f19546e26b48e51df1c29551e35341367ecf42080d551bb02417b160cc72c5673443efc0cfb928c21595b947", 0x90, 0x40}, {&(0x7f00000000c0)="0cd1f7d86091e650a9d8c67deb340581c18163e445e6d075f68a197a8c41c172b4c7fdb6204f3f71f95d97ac12b182160499c44dde6861ee4e9c53a7567c25a30dd77dc9cdf8ec3a84ba1bdbdeb4bb938a2a790c186b22507c093a31bf40efef910c19813986049930b7ff439bb2c7de80d4de63e3cc9b2708f630d51a81fcbf1f02491dbd7e54471fdf443fab64de092739935e56ce30c9ec78333464f0cb345442a94626ddeff0c7352654b00d123c0b53688d8635c7c54bdfe0d1bd6267339a7814f444416b0e9b09759b798bd4008528febfd1edb5818db3843aa0", 0xdd, 0x8001}]) 08:35:25 executing program 0: pipe(&(0x7f00000002c0)) fork() 08:35:25 executing program 5: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000011c0), 0x0, &(0x7f0000000000)={[], [{@uid_eq={'uid'}}]}) 08:35:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)={[{@fat=@tz_utc='tz=UTC'}]}) 08:35:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 08:35:25 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) [ 859.891138] FAT-fs (loop5): bogus number of reserved sectors [ 859.915243] FAT-fs (loop5): Can't find a valid FAT filesystem 08:35:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c09425, 0x0) [ 859.996059] FAT-fs (loop5): bogus number of reserved sectors [ 860.006702] FAT-fs (loop5): Can't find a valid FAT filesystem 08:35:25 executing program 5: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 08:35:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1010000, &(0x7f0000000080), 0x0, &(0x7f00000012c0)={[{@fat=@usefree='usefree'}]}) 08:35:25 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', 0xffffffffffffffff) 08:35:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)={[{@fat=@tz_utc='tz=UTC'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x100000000}}]}) 08:35:25 executing program 5: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write$tcp_congestion(0xffffffffffffffff, 0x0, 0x0) 08:35:25 executing program 2: r0 = openat$bsg(0xffffff9c, &(0x7f00000020c0)='/dev/bsg\x00', 0x0, 0x0) readlinkat(r0, &(0x7f0000002300)='./file0/../file0\x00', &(0x7f0000002340)=""/219, 0xdb) 08:35:25 executing program 4: clone(0x0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)="16a1b045bad97a8f") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) 08:35:25 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xff0f, &(0x7f00000012c0)) 08:35:25 executing program 0: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) 08:35:25 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc004240a, 0x0) 08:35:25 executing program 5: syz_genetlink_get_family_id$net_dm(&(0x7f0000000b00)='NET_DM\x00', 0xffffffffffffffff) 08:35:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000008"], 0x3c}}, 0x0) 08:35:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 08:35:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000e476e6f6f6b9271e2e"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x74) 08:35:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:26 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000003c0)="b6720b", 0x3, 0x2}, {&(0x7f0000000000)="2cb2fadc7ccce1ff1cebda9835b480e8f50de93799a2c867d24a2b4ff7805774d8a09d3ea42e29e2964853e63f1bdf1d373cadec07a6e157beae458ed71dbda99aff1f26c1d76b027f3013347ba377115520e1eb55bba9b2c44698ad1a0e53fac0c84173bb25635902888b1277ac036729d116d866", 0xffffffffffffff2a, 0x3}]) 08:35:26 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 08:35:26 executing program 1: syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x8000, 0x0) 08:35:26 executing program 0: pipe(&(0x7f00000002c0)) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000004c0), 0x8, &(0x7f0000000540)) 08:35:26 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) ftruncate(r0, 0x7c) chdir(&(0x7f00000001c0)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 08:35:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x103, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde7e65cdafb4f8fa, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x75, 0x0, @local, @local, 0x8000, 0x0, 0x8, 0x10001}}) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x8, 0x5, 0x8, 0x1, 0x0, 0x400, 0x100, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x302, 0x1, 0x8, 0x6, 0x0, 0x101, 0x40}, 0x0, 0xc, r0, 0x2) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@remote, 0x76, r2}) syz_open_dev$vcsa(0x0, 0x792, 0x2002) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x3, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @mcast2}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, r4, 0x4, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f0000000440)='net/netlink\x00') 08:35:26 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x103, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde7e65cdafb4f8fa, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x0, 0x0, @local, @local, 0x8000, 0x0, 0x8, 0x10001}}) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x8, 0x5, 0x8, 0x1, 0x0, 0x400, 0x100, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x302, 0x1, 0x8, 0x6, 0x0, 0x101, 0x40}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@remote, 0x76, r1}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x3, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @mcast2}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, r3, 0x4, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f0000000440)='net/netlink\x00') 08:35:26 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 861.520125] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 861.568568] overlayfs: 'file0' not a directory 08:35:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x150, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 861.616069] overlayfs: './file0' not a directory 08:35:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde7e65cdafb4f8fa, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x4, 0x5a, 0x3f, 0x75, 0x0, @local, @local, 0x8000, 0x0, 0x8, 0x10001}}) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x8, 0x5, 0x8, 0x1, 0x0, 0x400, 0x100, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={0x0, 0xa}, 0x302, 0x1, 0x8, 0x6, 0x8, 0x101, 0x40}, 0x0, 0xc, r0, 0x2) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@remote, 0x76}) syz_open_dev$vcsa(0x0, 0x792, 0x2002) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x3, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @mcast2}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x5b3}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, 0x0) perf_event_open$cgroup(0x0, r3, 0x4, 0xffffffffffffffff, 0x1) syz_open_procfs(0x0, &(0x7f0000000440)='net/netlink\x00') 08:35:26 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 08:35:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 08:35:27 executing program 0: shmat(0x0, &(0x7f0000003000/0x2000)=nil, 0x5000) syz_open_procfs(0x0, &(0x7f0000006540)='net/tcp\x00') 08:35:27 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@getsa={0x28, 0x12, 0x1, 0x0, 0x0, {@in=@remote, 0x0, 0x0, 0xff}}, 0x28}}, 0x0) 08:35:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@empty, @in=@multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) 08:35:27 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000e40)=ANY=[], 0x1378) finit_module(r0, 0x0, 0x0) 08:35:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x7) 08:35:27 executing program 5: socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x64}, 0x0, 0x0, &(0x7f00000001c0)={0x0, r1+30000000}, 0x0) 08:35:27 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000010000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f0000004000/0x10000)=nil, 0x6000) 08:35:27 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@local, @in=@multicast1}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, 0xa0}}, 0x0) 08:35:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x151, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:27 executing program 0: shmat(0x0, &(0x7f0000003000/0x2000)=nil, 0x5000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)) 08:35:27 executing program 2: r0 = socket(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40) 08:35:27 executing program 4: semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)=[0x0]) shmat(0x0, &(0x7f0000007000/0x3000)=nil, 0x6000) shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000006000/0x2000)=nil, 0x4000) 08:35:27 executing program 0: socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x64}, 0x0, 0x0, &(0x7f00000001c0)={0x0, r2+30000000}, 0x0) 08:35:27 executing program 2: shmat(0x0, &(0x7f0000003000/0x2000)=nil, 0x5000) r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003680)) 08:35:27 executing program 4: write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0x10) shmat(0x0, &(0x7f0000010000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000004000/0x10000)=nil, 0x6000) 08:35:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup(r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080), 0x4) 08:35:30 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x54, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f57c2e3eda1dc79e3fd6c66ceac3c01de10859855932b57c3fec3e78cc0a9c31cc04cc015dd99e26a4211f2aa037df940088c6b7c0bf37f68b68ed4fd53dec3ed4870e3774a2e732d9cbd6000029e7e431017bf301b66c4c5bf9893a96e39628b8f3ff7ae5afcc8c1bda3d405ca9897ab93f0c4c6185ddaa69f3967dd583ef4385", @ANYRES16, @ANYBLOB="200027bd7000fbdbdf25040000000c00018008000300010000001c000180080003000300a4a4588c63a412b200000800030003000000"], 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x20000080) 08:35:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000040c0)='net/ptype\x00') read$FUSE(r0, &(0x7f0000004100)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 08:35:30 executing program 4: shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000004000/0x10000)=nil, 0x6000) 08:35:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) 08:35:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x152, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:30 executing program 0: r0 = socket(0x11, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000440)) 08:35:30 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 08:35:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000010000000ce0000000f0000000100000000000000001b0000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[]) 08:35:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 08:35:30 executing program 4: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000680)='net/ptype\x00') r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:35:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002740)={&(0x7f0000000040), 0x6, &(0x7f0000002700)={&(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRES16], 0x1ec4}}, 0x0) 08:35:30 executing program 1: r0 = socket(0xf, 0x3, 0x2) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', r0) 08:35:30 executing program 2: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f00000001c0)=[{0x0, 0xe8e4}], 0x1) [ 865.203648] EXT4-fs (loop5): Invalid log cluster size: 6912 08:35:30 executing program 1: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x20, 0x0, 0x10001) 08:35:30 executing program 0: shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x4000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000001040)=""/12) 08:35:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x153, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 865.296843] EXT4-fs (loop5): Invalid log cluster size: 6912 08:35:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000580)=0x3) 08:35:30 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000280)='ns/user\x00') 08:35:30 executing program 1: shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000004000/0x4000)=nil, 0x6000) 08:35:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000010000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000380)=ANY=[]) 08:35:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[], 0x3c}}, 0x0) 08:35:33 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v1={0x1000000, [{0x0, 0xffff676c}]}, 0xc, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:35:33 executing program 4: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000680)='net/ptype\x00') r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:35:33 executing program 1: semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)=[0x0]) shmat(0x0, &(0x7f0000007000/0x3000)=nil, 0x6000) shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) 08:35:33 executing program 5: time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000010000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0088cb78c975a52997c1789fe4332673c9d49272ed7411a8a2c8d930b3e91971c8770bc563e92808b39409fc279088505ec9007d72e3957d777edde0cfdb11cd46c7fbddbb44c33cb23626e3f0c71483537eda82c5b999a5c6db5e32c231e48dfbd1ba3ad6fdf52ba8135931962f477781266ea44aabbdca1a6e16eddc81b8a6e91aacfcb05fee"]) 08:35:33 executing program 2: time(&(0x7f0000000180)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000010000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0088cb78c975a52997c1789fe4332673c9d49272ed7411a8a2c8d930b3e91971c8770bc563e92808b39409fc279088505ec9007d72e3957d777edde0cfdb11cd46c7fbddbb44c33cb23626e3f0c71483537eda82c5b999a5c6db5e32c231e48dfbd1ba3ad6fdf52ba8135931962f477781266ea44aabbdca1a6e16eddc81b8a6e91aacfcb05fee"]) 08:35:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x154, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:33 executing program 1: r0 = socket(0xf, 0x3, 0x2) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 868.264013] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a800e018, mo2=0006] [ 868.276652] System zones: 1-2, 19-19, 35-38, 46-46 [ 868.303632] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 08:35:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000001c0)="200000000001000010000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080f665be7244e0f4e8", 0x61, 0x400}], 0x0, &(0x7f0000000380)=ANY=[]) 08:35:33 executing program 5: r0 = socket(0xf, 0x3, 0x2) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x41) 08:35:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000005c0)="200000000001000010000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f00000c000100000001000000000000000b000000806c", 0x5a, 0x400}], 0x0, &(0x7f00000003c0)=ANY=[]) 08:35:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002280)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001100)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000002c0)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="c254341beaf3c8dd00cd6db86a9bfd54b8bd0bd47099a54839592fa60beda8fca84fda810930a88825312b58cca6a91129c6bfed70f11f910000003a98eed3fc0d618f978c7a1acc18ebe7bf4017d888257bf2611f32b61f9201a22c5191dcfd61b63b043f63ddc859c614c1da13f84a46b9b790ee5db68b493295a4975f8760ad93c82d947c933b84fe2abd39793c40999ef3e8cba91092a282400a639cc8468f3c3318ac3425839682b3da2a721fefdea0a6d1b56f5ee548995914", 0xbc}, {&(0x7f0000002300)="dbf956e833361301dd434c675a9c4288c4b86c2103c494ff2f57e4c44ad1521a5beee08aa12bd0a9851ecc996ca539251c7b5baa8e7d9b1f7a666c7619209df716549d3130f524bd3236ca825f7c1ef4e6c5ac4ec4942c3825fc9ae579254c52f8bc50117082eab4ce120e749893d55fe880bf180fec71ebdc5b01499a9a392bedffb7a201cd3334b05415ea98523c3c2fbea93ea1195b3d81bebcad73c05cc3b7a58429e9e2e806321527daee47c85f9593934fafa12e63bd9cb02878fe6cc37d682eec2cd72e6596f8b68b021b3d2910e1166c77297af6ae9d5e68a2f686d859d2903a02282bf827290c55ab8e2dddf209f19362babcba92a4b19ae5543af9f5972bbd1cc179547e82ec4dca8c927fa9b717f17d3a1d570f9131ac09e1d7ea3c71e7c1d22a9bd360878ede69c7c14c76a712540ab2edd1b66b82811576e029fe8ff33418c84dc83eb5ac7c9d342b6ee107e14d753e7581855d99a1294bcfaf22bb23e3c083fd02a49804ab4b56d74355b908f4eed47125fedafdd5ba8a0dca296e1f77db5204940577968a4de380f6998bb073296f2ec2e9f44731be8c553bc4d5152a3d0d7463e9e7868a0b7a2268312273b6c1fcab93dd8388b5cae4571d3a937a075e27f8b4344c13b26bcd683e258b593f7522fc8337261d895040cddd3abadd17226862032a8f5fb2755b2093aec6f199de79007503eabf29acb4eb50a2b09f5c0dce979366515ded1f133e5b2b0060ac5a8389506cb7c6d82f1c2925707773fb7051f9287ba1abfaae023d31e5150566cc0d6841993b7b28a64007b7f46f2a636619e6fbcb9c1723661c683548eacf77330f151011a145d14ca895076738ef1483893f53c5d1c5f43d6cd394678fdd26a855822d5a895c4f7c9d7032323644a91fbe7ef643cb746a7af4b02a468518adf477717ffb71eeafabebda964a36bce0694d2c60f8b476a6addc813b007123d9be6a45996084cc00af57cd1a248233e338abb079a6ecf820499f44409ef9ab89f4cf12d5103595ae4da5f9563edd2e5b0ca957add74d11b5dc8d7dfc9be4f87e317da5e3c1e63dd373d21ed73933efda7bc77f328b2ac4ad71741480e336004efd3c325430177ad5eb8bd7bcc359ec8c8488e820482243c9f36c453a0786e3eb24eb47a7c5da0a4ef134da97037550088ff806906ba59127b6d41ef9c1e5038c1d22d378a07d36fc78a1155ecd73a7ec39ac639392feee0f5edf273fbe7f296c4fa0e04fe5f67ecfd615560f054e50af514429e3b4e967c6163ee9e7d9448a4e5b0d903562c64c89e05a1eaeb93aba30754140b034a7ee8ce3d659bc9d2b83321edfcfb2be92559ff17d8ca3f62454e45dbb6dea32652f1756869b23d32c7622b8aad1ae54a4c1b3ab566a6eaebd7186dcf864174da6c0e391ce9b93e1ee5157cb3b6b41a11f7fcf4231c841d2b10e368ba5e18fca4870484d953a4ff9aceab0d6265a5db613e08f92c9924e135d3e5e75f6f166a044cae6a354cafd471d9962af800c204765ac940ac14a80f4e49e065387ee7137248d7fa911c8885df50f2e818f6e097a2acf3ddca125c0aa6041115bb5b63acafe6a5510b7fd405e2d200270c3fcd04b59d71e2c870497b6327a9abd48c85cf191f12cd113463b240ab51dbdb985c31f30110d071ef5de5703a7f06742095cd179eab3a6488f669888b2ed408a52515279793b3479ddc1f48d4007bb5e3394848487930bc411f333d44afd3ae0e8c8738eb4acb5c7b9cd5918d596e137a0147ac90e3ca75b80b1f4c76b66fd4d775f883b566bce6c65e5c99dcebaa5f79c64f517c52cacc36cc9b2f68bcda1d13f41139749209f1bb05ed22d90235c87a00149af34292fd7093048bee7322e87cc019c36f2188b9daa08da7579a60c072ee46d581b882187bee664ec62cf83f96ab05874f80151c7e901bc4dcf8af500c2f9343fd841b2f02208f6aaaf3f4d8d09e65144d356e1e773c09a4bbaa48a59e345f38e23ca8b72c20c1e9a1e9f8505f08e36fbdfe260abaa4ab175124415c349f169b057c8e22517b6c35a90c5133bbbaada07766355bba75cda4075eb9aa41ee5504189d81a5cb89c411efa8fa79cad188b02535da962d4164283839b4163c39db1da55cbea9faf9311e46631a4726c02dbc652ee96c50a3aebaef8e0a73dfeac0777c83a42272802114dcfed9974a95bf74bb7b6aa386763ed06dae8890ebb71a742afa0a73a3e848b495049cd2d36f5a50b62df809945b7eeb945c32b929f19a85d1984e626308cf72bcd44e27748cf03ec285eb9eac890977323ee74658935f8c9bc46968c17e3aea6fea6b1505d790d15ce6a0a443f3566350925353ef4aa2a1c2b77aaabe4bbde34ae6a2597792bab9f232d8cd5f3b6f0bca07126737628b3c47b88f42934083fc0a393d484cdc41b38ed336a07e6c217046beb7ac97585a8445c861a52fc058afb42e5ae9774693f275fb65f1ff36fcfbcb8b7d870f89ea97c2e2471f09ef821f7a04155c727e2cdc2e85ce9df7d0696b9d4cd74aece3d7cc57af837262ba3c29d9c386bfa8f502680b2fdb320e91d9051548b4bcc082ddf7edec37bbb2c9a37380414c872d62fff5cee64676008979c61e031816d42b0beb3480a3b014b397e59204311a2f12855fec9e7f04b0cfa29c6e5723c7edc3ee7c819d52125b47a862240c4bfb4a79ccd42ea5c6147eae9103eca5a2e5251a729413ffe42137487f44e6737ad024091e01d34b61455b4bf3057daba71547be784c72745b44abc57a3538c246b9123cf9cabc5cd50dd2af1550f4b9994967d0104f379a0248c10dd6dc644b97884afc7ca7c9a3d6e8e13975144a0cd3e92dd67f862f2ea28222c1109ed5b3ebdc9fe2f9a895f8fd01b3a506e333bb6049fb89092258bcb8201964061277ee7092f58a845f228cfb4de8306e3378936dd89dfe092af58cd596cbd2a3c8ae1fc28f9e5943032dc88254fd26e1ebbd445788b0f880a5527d90417f31a7b029384a3ed701d7711a2dfcf463b36e7773ac780104ff99f1d390b0f194e1e48f9b37fe7e5dad3899f7fc40e8989a281610bc9d37b254edf7ce291979fcb7633618897886447f7b38b20bf9887cb6241391292ca4c1be8eef9a11add45e1abeafd9cbc32ba247ed4ac25e1307cdb54cbc7420189f4c71c9859f15b5968c0d89854b6fceaf1108b16d35e84e463c1761276ec7af86d2edae4f5f445e9534af1cbffaec664b7be88071b8f7fc01bd81cceaa5f82b134f1b2f3151253b805247a1112c7103bd164d4c98058f5d268c3ad45cd12f9b17eb401eda1794321b1e40e01261d37cd52f31e07f165b8ed4ddb8ce6f442ba6d21988f105e574d78c448f365bffc2a0c9f6edd4af3b211b8811e8ad350d00732722bede3f10ad905fbe9fed384afa5c210617579521bec2bf836de709d85ff4cef13b9526862fb7f3a23c0db8575d33baaaa25aacee14af29f3768d713920904cb1506aafb955cc1e3c14abc617c2435bc7570e6b7e19265ea3f0b72d070d83b0ef80c47ee824707e4f761770b8b01b53091945f83b652a34452d11762afe44f3c9939cc55d1a09759ebb6c479ae997c38fe0ff718ac099a9d127b49a6b9201ae09e42502f6144c97c737c705aceca13d5038e5db8e36231e3f67a895cab5ca6b9d268c743217c81e245317489878b7d60467f7e88dfe8d234483553a1f35bcaaabaeb80fadc8eda195fe57a4233ff836c50331870ee2869b314b627a17600c9c5300102d5be35124ec27fb25238d9368b1b71e00cc0bfb78901cd365cba8d2fa1f0f324d2207559e82372695299adf9328343ec2ef0884b51a8417cafcbee5f4b32b47ad2a7e561e6bab36b6a9736f675e98c174dda65a2fd19a9c1f629fd3484b5158e1fc3f1abb4088805265057be15e282abc7b290d0908778c282d55f7cda7f701041144df26fba85339ff9374996334cc5ed15692863bc2df0d60c78e69720ed0999338a4e7c49fd79e663ebda3e5f72ee751091c0a4d03e43b35c58bfdaf29ce84f143ccbf2bb8ece4059964db744e93b26c705e0435957a760037ff9ab3b2a7572cec83b1d261435026758128833c10710799ca9b3362e8fdac4e533751e44492bc3a62d8d2d25c8efb1b1d22e99f9825bca909dd6fc084dc44ce958eb8d08125950e2709c9702f4539488df22c0f8e58a8b0dc334750967ab0c06ce91c194a2447b694c93450e0178d9d88ecd287da72de3606780718e033c71caa82262cc7e2226e0608cfced2d719beb0e95f92f67aa0cefeae29279258a259c47d2cf34eb0dc231caf35062fe3855100927ff2a3ff28c07ed29d79298c5a8fe035e9cde475b49d74ce9ad788f6dfb41345b0807a5ea2c99758e87bbcde9be9ffad34aa66171bd1776b806474acfb41189506f511f9ea2b8811dc4d3f07d24a8d2e7f0103f0dc75f5ecbf91dd155f97fb8f7bb3243227b68664e9870baef228238b1ca83f0685443191d2fa7895da5d8ba37037bfd2c8df5892307b781744b586aa496613ca3d84c73e3077092d450c94a9f6a0b91f2422316b8d2eba4e7ae5f32990e41f3c11966262219f04c9aab90721fc5da05906ce41c604a6cb07779a39dbece2b526662f6af2a0023e03c15a856c39342d83fe1de69615a324ae7fecb8dfe881e02871f65d70d54fbcbbe371fcecb16bc62dc960d837335cd11ca27b55c3cdb7afce7d8ededa8dd43fc30fc9f73eceab42b21c0ecd466936e6eb96a2fc5e970962768dbd74d7e168de11d417db4dc55f66e13018da7fd31c9c91f2e31ec08c17f9334ec94273ca2f772e9b56d3f0533b6fe5576f0c21bf8e9f4ddcde017d9e5c4cc76accae5af4b11561ddbfcc09724b9f900f915e8ea5b735ae5b664b3add3ebcb126959e745b2d6f7db0b980fae8ed28803a8b88fcc3bafd09654497585c9e07e5fbb7e403dcc07ed0b40c1e8665b15516d5ec21a5d50a9ca107fde0590630e05c8379a724985135b62284bd137b750861df6ffccab334de82c256e93e3cca69c2921517b01644e86df6fdeee4df76da98d95e29a4d17bca7d7c506b1905fb800dd45e2a1c9813745eba2b58284b983a7df473f6e5e36e17f6efaa4c2d6b869d652012079d053c0e00aa479c4bf19d8413457c5b9e0f73b1707ba884f841141033145cb81f85f2f011f3038", 0xe54}], 0x2}], 0x1, 0x0) 08:35:33 executing program 1: socketpair(0x0, 0x80b, 0x0, &(0x7f0000000040)) 08:35:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000000)=""/83, &(0x7f0000000080)=0x53) 08:35:36 executing program 4: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000680)='net/ptype\x00') r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:35:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xf5, &(0x7f0000000100)=""/245, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:35:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) 08:35:36 executing program 1: unshare(0x60000000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x32, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_b}}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6, {0x0, 0x7f}}}}}}]}, 0x50}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, 0x0, 0x0) 08:35:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x155, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) [ 871.342337] ieee802154 phy0 wpan0: encryption failed: -22 [ 871.348015] ieee802154 phy1 wpan1: encryption failed: -22 [ 871.366013] IPVS: ftp: loaded support on port[0] = 21 08:35:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001100)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000880)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="4d1b95ce0b0d2d3d8da191dc2775c7c214398389754b6d73444d799a85a7fd57c8", 0x21}], 0x1}], 0x1, 0x0) 08:35:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002280)=[{{0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001100)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000880)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="4d1b95ce0b0d2d3d8da191dc2775c7c214398389754b6d73444d799a85a7fd57c83c1ba95d4882b712416d236124e359f451d5c0e2d3c058b502d2ed9cfb6bdc5a9badfdfdbe0c9a3c748ce95a19a3276bb025968beb5322eb97b6e0c6a62f63644e07e7", 0x64}, {&(0x7f0000000940)="c254341beaf3c8dd00cd6db86a9bfd54b8bd0bd47099a54839592fa60beda8fca84fda810930a88825312b58", 0x2c}], 0x2}], 0x1, 0x0) 08:35:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="d3ce913455105edb2dc09fa49ef5c0fad543c8a6e9e11a28645ed777620546d347e4932dbf26ae5cc546d0f141711bbc79502309293cbc720f5bb106108f238a24325389387afc3c77d128f89acbc1967ed58705edfe99a08a8a7c520dfcb0277c406439b24665f39b9733b6e79e97b1f6a13f8d2ca96dc78f5dbe3732ad2199fe25244f3d04a073348f523421c23c9be2fd3001c106f4e3de1652dbc44e898ba8", 0xa1}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000d00)=[{{0x0, 0x40000, 0x0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f00000010c0)=""/102400, 0x19000}], 0x1}}], 0x2, 0x0, 0x0) 08:35:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000003680)={'sit0\x00', 0x0}) 08:35:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001680)={&(0x7f00000014c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x10}}], 0xfe0e}, 0x0) 08:35:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', 0x0}) 08:35:39 executing program 4: ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000680)='net/ptype\x00') r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:35:39 executing program 2: pselect6(0x0, 0x0, &(0x7f0000002340), 0x0, &(0x7f0000006640), &(0x7f00000066c0)={&(0x7f0000006680)={[0x240000]}, 0x8}) 08:35:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000003d80)={'batadv_slave_1\x00'}) 08:35:39 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) recvmsg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 08:35:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x156, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x50, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x2e, 0x33, @action={@wo_ht={{}, {}, @device_a, @device_a, @random="1fc1dda128fb"}, @channel_switch={0x0, 0x4, {{0x25, 0x3}, @val={0x3e, 0x1}, @val={0x76, 0x6}}}}}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}]}, 0x50}}, 0x0) 08:35:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000003100)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) 08:35:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040)={0x800}, 0x8) 08:35:39 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 08:35:39 executing program 5: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0x6, &(0x7f0000000240)=""/190) 08:35:39 executing program 2: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8) 08:35:39 executing program 1: socketpair(0x21, 0x0, 0x7, 0x0) 08:35:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x157, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:42 executing program 0: open(&(0x7f00000017c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000002d00)='./file0\x00', 0x104) 08:35:42 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000002580)={0x0, 0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 08:35:42 executing program 2: select(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x9}) 08:35:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 08:35:42 executing program 4: pipe2(&(0x7f0000003a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="1f", 0x1}, {&(0x7f0000000040)='%', 0x1}, {0x0}, {&(0x7f00000001c0)="03", 0x1}], 0x4) 08:35:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) shutdown(r0, 0x0) 08:35:42 executing program 5: fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) 08:35:42 executing program 1: syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 08:35:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 08:35:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) bind$bt_hci(r0, 0x0, 0x0) 08:35:42 executing program 5: mknod(0x0, 0x8000, 0x0) 08:35:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x158, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3, 0x2}]}]}}, &(0x7f0000000180)=""/238, 0x2e, 0xee, 0x1}, 0x20) 08:35:43 executing program 4: bpf$BPF_BTF_LOAD(0x4, 0x0, 0x0) 08:35:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) 08:35:43 executing program 5: setresuid(0x0, 0xee01, 0xee01) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000100)) setresuid(r0, 0xee01, 0xee01) 08:35:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x894c, 0x0) 08:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:35:43 executing program 0: io_setup(0x400, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)={&(0x7f00000000c0)={[0x1]}, 0x8}) 08:35:43 executing program 2: syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000840)) syz_mount_image$vfat(&(0x7f0000000a80)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000d00), 0x0, 0x0) 08:35:43 executing program 4: r0 = creat(&(0x7f0000000880)='./file0\x00', 0x0) write$bt_hci(r0, 0x0, 0x0) 08:35:43 executing program 1: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0), 0x200000c8}) 08:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/236, 0x32, 0xec, 0x1}, 0x20) 08:35:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x159, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x3}]}]}}, &(0x7f0000000180)=""/238, 0x3e, 0xee, 0x1}, 0x20) 08:35:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000240)=""/237, 0x26, 0xed, 0x1}, 0x20) 08:35:43 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 08:35:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x2, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}, @NFQA_CFG_PARAMS={0x9}]}, 0x30}}, 0x0) 08:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@var={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x1e]}}, &(0x7f00000002c0)=""/222, 0x32, 0xde, 0x1}, 0x20) 08:35:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x3, 0xffffffffffffffff, 0x1}) 08:35:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x200002) write$bt_hci(r0, 0x0, 0x0) 08:35:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20004050, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) 08:35:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x80108907, 0x0) 08:35:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000180)=""/238, 0x32, 0xee, 0x1}, 0x20) 08:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {0x3}, {0x8, 0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/238, 0x60, 0xee, 0x1}, 0x20) [ 878.539524] Bluetooth: hci1: command 0x0406 tx timeout 08:35:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:43 executing program 2: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 08:35:43 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "2744d07731e828a0ca81e18622662e62d5b712261d42b127c02187f8abb70cccc091cf75c27902bc1c859d9b0a9ccaf36801e7935adb1a420e1c1f029a45a2cc"}, 0x48, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r1) 08:35:43 executing program 4: clock_getres(0x3, &(0x7f0000000500)) 08:35:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{@rodir='rodir'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_user={'obj_user'}}]}) 08:35:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1}}]}}, 0x0, 0x32}, 0x20) 08:35:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x68000000}, {0x0, 0x1}]}]}}, &(0x7f0000000180)=""/236, 0x36, 0xec, 0x1}, 0x20) 08:35:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000180)=""/236, 0x1a, 0xec, 0x1}, 0x20) 08:35:44 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x4000, 0x0) 08:35:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x1001, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000180)=""/236, 0x36, 0xec, 0x1}, 0x20) 08:35:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, 0x0, 0x0) 08:35:44 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 08:35:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:44 executing program 5: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "2744d07731e828a0ca81e18622662e62d5b712261d42b127c02187f8abb70cccc091cf75c27902bc1c859d9b0a9ccaf36801e7935adb1a420e1c1f029a45a2cc"}, 0x48, 0xfffffffffffffffe) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={0x0, 0x0}, 0x20) 08:35:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) 08:35:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000180)=""/236, 0x1a, 0xec, 0x1}, 0x20) 08:35:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000280)=0x10) 08:35:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/222, 0x30, 0xde, 0x1}, 0x20) 08:35:44 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 08:35:44 executing program 1: setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000080), 0xffffffffffffff85) 08:35:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=',seclabel,context=']) 08:35:44 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x20040, 0x0) 08:35:44 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000580), 0x24, 0x0) 08:35:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@private2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@dev, 0x0, 0x6c}, 0x0, @in6=@mcast2, 0x0, 0x1}}, 0xe8) 08:35:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x2, 0x2}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/238, 0x50, 0xee, 0x1}, 0x20) 08:35:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x8092, &(0x7f00000003c0)={[{@shortname_lower='shortname=lower'}], [{@audit='audit'}]}) 08:35:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xb, 0x1}]}]}}, &(0x7f0000000180)=""/236, 0x36, 0xec, 0x1}, 0x20) 08:35:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x4}, 0x0) 08:35:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28}, 0xf4) 08:35:44 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x0, 0x6887}}) 08:35:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x0, 0x0, 0x0, 0x4}}) 08:35:44 executing program 1: r0 = creat(&(0x7f0000000880)='./file0\x00', 0x0) write$bt_hci(r0, &(0x7f0000000100)=ANY=[], 0x7) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) 08:35:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x0, 0x1100}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29}, 0x20) 08:35:44 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', 0x0, &(0x7f00000000c0)=ANY=[], 0x48, 0xffffffffffffffff) fork() 08:35:44 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 08:35:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:45 executing program 1: socketpair(0x2, 0x1, 0x0, &(0x7f0000001280)) 08:35:45 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0x0) 08:35:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, "57a423e0"}, &(0x7f0000000080)=0x28) 08:35:45 executing program 2: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 08:35:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) accept$inet(r0, 0x0, 0x0) 08:35:45 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x40000}, 0x0) 08:35:45 executing program 5: setresuid(0x0, 0xee01, 0xee01) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, 0x0, 0x0) 08:35:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x0, 0x401}}) 08:35:45 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0xd}, 0x10) 08:35:45 executing program 0: setresuid(0x0, 0xee01, 0xee01) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, 0x0, 0x0) 08:35:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000180)=""/236, 0x26, 0xec, 0x1}, 0x20) 08:35:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @empty}, {0x0, @multicast}}) 08:35:45 executing program 5: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0x0) 08:35:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB=',']) 08:35:45 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {}, [{}, {}], {}, [{0x8, 0x0, 0xee01}]}, 0x3c, 0x0) 08:35:45 executing program 1: setresuid(0x0, 0xee01, 0xee01) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) setresuid(r0, 0x0, 0xffffffffffffffff) [ 880.398160] FAT-fs (loop4): bogus number of reserved sectors 08:35:45 executing program 1: setresuid(0x0, 0xee01, 0xee01) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:35:45 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x0, 0x12}) 08:35:45 executing program 5: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x80247009) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 880.443544] FAT-fs (loop4): Can't find a valid FAT filesystem 08:35:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) [ 880.530181] FAT-fs (loop4): bogus number of reserved sectors [ 880.548383] FAT-fs (loop4): Can't find a valid FAT filesystem 08:35:45 executing program 1: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4020}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:35:45 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "2744d07731e828a0ca81e18622662e62d5b712261d42b127c02187f8abb70cccc091cf75c27902bc1c859d9b0a9ccaf36801e7935adb1a420e1c1f029a45a2cc"}, 0x48, 0xfffffffffffffffe) clock_gettime(0x0, &(0x7f00000000c0)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) keyctl$assume_authority(0x7, r0) 08:35:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x15f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:46 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:35:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000002c0)=""/222, 0x31, 0xde, 0x1}, 0x20) 08:35:46 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:35:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x890c, 0x0) 08:35:46 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 08:35:46 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101002, 0x0) write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_set_adv_set_rand_addr={{0x2035, 0x7}, {0x0, @fixed}}}, 0xb) 08:35:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in6=@private0, 0x0, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x4}}, 0xe8) 08:35:46 executing program 0: socket(0x10, 0x0, 0xc2f) 08:35:46 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000440), 0x8) 08:35:46 executing program 1: clock_gettime(0x6, &(0x7f0000000140)) 08:35:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x891c, 0x0) 08:35:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$bt_sco(r0, &(0x7f00000003c0)={0x1f, @none}, 0x8) 08:35:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xb}, {}]}, @func_proto, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe}]}]}}, &(0x7f0000000180)=""/236, 0x62, 0xec, 0x1}, 0x20) 08:35:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$fuse(&(0x7f0000000100)='fuse\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC]) 08:35:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x160, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001280)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 08:35:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000001680)={0x2c, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_CMD={0x8}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x28}]}, 0x2c}}, 0x0) 08:35:47 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 08:35:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001280)={0x1c, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 08:35:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x30, 0x2e]}}, 0x0, 0x2a}, 0x20) 08:35:47 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000080)={0x0, "2744d07731e828a0ca81e18622662e62d5b712261d42b127c02187f8abb70cccc091cf75c27902bc1c859d9b0a9ccaf36801e7935adb1a420e1c1f029a45a2cc"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 08:35:47 executing program 5: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) clock_gettime(0x0, &(0x7f0000000040)) 08:35:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f00000002c0)=""/222, 0x2a, 0xde, 0x1}, 0x20) 08:35:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000280)) 08:35:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 08:35:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x0, 0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/238, 0x38, 0xee, 0x1}, 0x20) 08:35:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x161, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:47 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000540)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000640)=ANY=[], 0x48, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 08:35:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x74, 0x0, 0x43}]}}, 0x0, 0x2a}, 0x20) 08:35:47 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050008", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x1000}, {&(0x7f0000011a00)="504d4d00504d4dff", 0x8, 0x8000}, {&(0x7f0000011b00)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x9000}, {&(0x7f0000012100)="2719c0d901000000803a0900803a", 0xe}, {&(0x7f0000013b00)="ed41000000100000dff4655fe0f4655fe0f4655f000000000000040008", 0x1d, 0x22080}, {&(0x7f0000013c00)="8081000000180000dff4655fdff4655fdff4655f00000000000001001000000010000800000000000af301000400000000000000000000000200000009", 0x3d, 0x22100}, {0x0, 0x0, 0x22180}], 0x0, &(0x7f0000014900)=ANY=[@ANYBLOB='\x00']) 08:35:47 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ptmx\x00', 0x2a00, 0x0) 08:35:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc0189436, 0x0) 08:35:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x5451) 08:35:47 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000140)) 08:35:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000200)=""/129, 0x2e, 0x81, 0x1}, 0x20) 08:35:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000000)={0x77359400}, 0x10) 08:35:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000012c0), 0x40) 08:35:47 executing program 5: r0 = socket(0x1, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 882.637060] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 08:35:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x162, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001c40)={'batadv_slave_0\x00'}) 08:35:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@getsa={0x28, 0x12, 0x203, 0x0, 0x0, {@in6=@empty}}, 0x28}}, 0x0) 08:35:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2020, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) 08:35:48 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004080)=[{0x0, 0x0, 0x0}, {&(0x7f0000001800)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001b80)=[{0x0}, {0x0}, {&(0x7f0000001b00)="5f16e4d971d5a764c7aa303ec8a6e90faaae1a71b3cc1f1446d8814da316efd033c7ff614e8c7fc1e90c0dcb7b2372daa6efbd185191f115f44dcb98f55f18cc52", 0x41}], 0x3, &(0x7f0000001c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x60}, {&(0x7f0000001d00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001e00)=[{&(0x7f0000001d80)="67f30ec7d873fa6399414324bfd4acb2aba569cfd154400dd5022ac94f2d2d817a42fcc8d0a5eac875", 0x29}], 0x1, &(0x7f0000001e40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x4c000}, {0x0, 0x0, 0x0}, {0x0, 0x0, &(0x7f0000002b40), 0x0, &(0x7f0000002cc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18, 0x1}, {&(0x7f0000002d40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000002f00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}], 0x6, 0x0) 08:35:48 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240), 0x0) 08:35:48 executing program 4: pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240), 0x0) 08:35:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) 08:35:48 executing program 5: pselect6(0x40, &(0x7f0000000180)={0x3}, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0}) 08:35:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000006040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) [ 882.985640] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 08:35:48 executing program 0: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a80)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 08:35:48 executing program 1: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 08:35:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x163, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:48 executing program 5: r0 = socket(0x11, 0x3, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 08:35:48 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0}) 08:35:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [], 0xa, "a1bfd2eba6"}, 0x10) 08:35:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000001dc0)={'syztnl2\x00', 0x0}) 08:35:48 executing program 0: r0 = socket(0x11, 0x3, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, 0x0) 08:35:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000007080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[{0x28, 0x0, 0x0, "140802699d04323c22d5dcf335031042cb"}], 0x28}}], 0x1, 0x0) 08:35:48 executing program 5: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x9}, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, 0x0) 08:35:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f000001b500)={&(0x7f000001b140)=@nfc, 0x80, 0x0}, 0x0) 08:35:48 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x125, 0x125, 0x5, [@restrict, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "c3"}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @struct, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x145}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:35:48 executing program 2: accept4(0xffffffffffffffff, 0x0, 0x0, 0x400) 08:35:48 executing program 5: sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) fork() 08:35:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x164, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r0, 0xffffffffffffffff) 08:35:49 executing program 4: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) 08:35:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000000980)=ANY=[@ANYBLOB="ec090000", @ANYRES16=0x0, @ANYRES32], 0x9ec}}, 0x0) 08:35:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00', r0) 08:35:49 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200040, 0x0) 08:35:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x165, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:49 executing program 1: r0 = socket(0x1, 0x3, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 08:35:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006100)={0x0, 0x0, 0x0}, 0x0) 08:35:49 executing program 2: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180)={0x3}, &(0x7f00000001c0)={0x5}, &(0x7f0000000200), &(0x7f0000000280)={0x0, r0+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x8]}, 0x8}) 08:35:49 executing program 4: setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0xc) pipe2(&(0x7f0000004b00), 0x84000) 08:35:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000000)={'vlan0\x00', @ifru_ivalue}) 08:35:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f000001b540)={{}, "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"}) 08:35:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) read$FUSE(r0, &(0x7f00000024c0)={0x2020}, 0x2020) 08:35:49 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 08:35:49 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) 08:35:49 executing program 5: timerfd_settime(0xffffffffffffffff, 0x3035f576912ff1c9, &(0x7f0000000080)={{}, {0x0, 0x3938700}}, 0x0) 08:35:49 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x5, [@var, @restrict, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xb9}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:35:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x166, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:50 executing program 4: add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0x0) 08:35:50 executing program 0: sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, 0x0, 0x0) 08:35:50 executing program 2: r0 = socket(0x1, 0x3, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, 0x0) 08:35:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000180)) 08:35:50 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001940)='/dev/cachefiles\x00', 0xc0a00, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 08:35:50 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x5, [@var, @restrict, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "c3"}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x101}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:35:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000340)={'ip6_vti0\x00', 0x0}) 08:35:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') timerfd_gettime(r0, 0x0) 08:35:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 08:35:50 executing program 5: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x8) 08:35:50 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x40a000, 0x0) 08:35:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x167, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:50 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) 08:35:50 executing program 0: r0 = socket(0x2, 0x3, 0xfe) recvmmsg(r0, &(0x7f00000035c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1040, 0x0) 08:35:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001c00)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001bc0)={0x0}}, 0x0) 08:35:50 executing program 4: getresgid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) 08:35:51 executing program 1: r0 = epoll_create1(0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 08:35:51 executing program 5: pselect6(0x40, &(0x7f0000000180)={0x3}, 0x0, 0x0, 0x0, 0x0) 08:35:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYRES16], 0x78}}, 0x0) 08:35:51 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000002440)={'syztnl0\x00', &(0x7f00000023c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @empty}}) 08:35:51 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f00000001c0)={0x5}, 0x0, &(0x7f0000000280)={0x0, r0+10000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x8]}, 0x8}) 08:35:51 executing program 1: lstat(&(0x7f0000000640)='./file0\x00', 0x0) 08:35:51 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 08:35:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x168, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000002500fb1200"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000800010065740002"], 0x48}}, 0x0) 08:35:51 executing program 0: clock_gettime(0x0, &(0x7f0000000240)={0x0}) pselect6(0x40, &(0x7f0000000180)={0x3}, &(0x7f00000001c0)={0x5}, &(0x7f0000000200), &(0x7f0000000280)={r0}, 0x0) 08:35:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x2) 08:35:51 executing program 1: memfd_create(&(0x7f00000001c0)='^\x00', 0x0) 08:35:51 executing program 1: r0 = socket(0x1, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) 08:35:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1e, 0x4) 08:35:51 executing program 0: add_key$fscrypt_v1(&(0x7f00000004c0)='logon\x00', &(0x7f0000000500)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000540)={0x0, "7e7a43d5a7838f9b3ee3c025498d19113152f41965005e042eaf0add6208738f509b1ceeb956b9a81c0fa3b96905617f13ce1a5457f8f0fb4b5404750aa871cf"}, 0x48, 0x0) 08:35:51 executing program 4: r0 = socket(0x2, 0xa, 0x0) connect$netlink(r0, 0x0, 0x0) [ 886.328404] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:35:51 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 08:35:51 executing program 2: epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f00000000c0)={[0x7ff]}, 0x8) 08:35:51 executing program 4: pselect6(0x40, &(0x7f0000000180)={0x3}, &(0x7f00000001c0)={0x5}, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x8]}, 0x8}) 08:35:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x169, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:51 executing program 0: newfstatat(0xffffffffffffff9c, &(0x7f0000011080)='\x00', 0x0, 0x0) 08:35:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000022c0)={0x0, 0x0, 0x0}, 0x0) 08:35:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 08:35:52 executing program 2: r0 = socket(0x11, 0x3, 0x0) read(r0, &(0x7f0000000080)=""/240, 0xf0) 08:35:52 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240), 0x0) 08:35:52 executing program 0: r0 = socket(0x1, 0x3, 0x0) bind$netlink(r0, 0x0, 0x0) 08:35:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:52 executing program 5: r0 = socket(0x1, 0x3, 0x0) read(r0, &(0x7f0000000000)=""/33, 0x21) 08:35:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000005ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2040, 0x0) 08:35:52 executing program 1: pselect6(0x40, &(0x7f0000000180)={0x3}, 0x0, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 08:35:52 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 08:35:52 executing program 1: pselect6(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x8]}, 0x8}) 08:35:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000500)={'ip_vti0\x00', 0x0}) 08:35:52 executing program 4: r0 = socket(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10061, 0x0) 08:35:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[], 0x78}}, 0x0) 08:35:53 executing program 4: epoll_create(0x1ff) 08:35:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 08:35:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:35:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000007080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[{0x28, 0x0, 0x0, "140802699d04323c22d5dcf335031042cb"}], 0x28}}], 0x1, 0x20000001) 08:35:53 executing program 5: getresuid(&(0x7f000000af80), &(0x7f000000afc0), &(0x7f000000b000)) 08:35:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:53 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200040, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 08:35:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001c00)={&(0x7f00000019c0), 0xc, &(0x7f0000001bc0)={0x0}}, 0x0) 08:35:53 executing program 1: write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000002040)={0x60}, 0x60) getresgid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) 08:35:53 executing program 0: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$ipvs(0xffffffffffffff9c, &(0x7f0000020b00)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) 08:35:53 executing program 2: syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') 08:35:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000007080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[{0x10}], 0x10}}], 0x1, 0x0) 08:35:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={0x0}}, 0x0) 08:35:53 executing program 0: getresuid(&(0x7f0000001080), 0x0, 0x0) getresgid(&(0x7f0000001140), &(0x7f0000001180), &(0x7f00000011c0)) 08:35:53 executing program 5: pipe2(&(0x7f0000004b00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r0, 0x0, 0x0) 08:35:53 executing program 2: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+10000000}, 0x0) 08:35:53 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) 08:35:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:53 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000002b80)='batadv\x00', 0xffffffffffffffff) 08:35:53 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x5}, 0x0, 0x0, 0x0) 08:35:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='maps\x00') ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 08:35:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 08:35:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)=0x24) 08:35:53 executing program 4: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000880)) 08:35:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000010c0)={0x0, 0x0}, 0x10) 08:35:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80) 08:35:54 executing program 1: r0 = socket(0x1, 0x1, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x104}}, 0x0) 08:35:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r0, r0) 08:35:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, 0x0) 08:35:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001500)={&(0x7f0000000000)=@alg, 0x80, &(0x7f00000004c0)=[{0x0}, {0x0}], 0x2}, 0x2002) 08:35:54 executing program 0: r0 = socket(0x2, 0xa, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 08:35:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x78}}, 0x0) 08:35:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') connect(r0, 0x0, 0x0) 08:35:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000007080)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[{0x28, 0x0, 0x0, "140802699d04323c22d5dcf335031042cb"}], 0x28}}], 0x1, 0x0) 08:35:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) accept4$packet(r1, 0x0, 0x0, 0x0) 08:35:54 executing program 1: ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000600)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @name="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"}) pipe(&(0x7f0000001780)) 08:35:54 executing program 0: r0 = socket(0x1, 0x3, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 08:35:54 executing program 2: getresuid(&(0x7f0000001080), 0x0, 0x0) getresuid(&(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)) 08:35:54 executing program 5: r0 = socket(0x1, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000), 0xc) 08:35:54 executing program 2: pipe2(&(0x7f0000004b00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) 08:35:55 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x9}, &(0x7f00000001c0), &(0x7f0000000240), 0x0) 08:35:55 executing program 0: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x5}, 0x0, &(0x7f0000000280)={0x0, r0+10000000}, 0x0) 08:35:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 08:35:55 executing program 2: r0 = socket(0x1, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 08:35:55 executing program 1: r0 = socket(0x1, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 08:35:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000010c0)={0x1, &(0x7f0000001080)=[{0x3, 0x0, 0x0, 0x80}]}, 0x10) 08:35:55 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x80000, 0x0) 08:35:55 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/timer\x00', 0x0, 0x0) 08:35:55 executing program 0: kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 08:35:55 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 08:35:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, 0x0, 0x0) 08:35:55 executing program 4: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000200)=[0x0]) 08:35:55 executing program 2: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180)={0x9}, 0x0, 0x0, 0x0) 08:35:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)) 08:35:55 executing program 2: pipe(&(0x7f0000001780)) 08:35:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000380)=@sco={0x1f, @fixed}, &(0x7f0000000400)=0x80) 08:35:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x16f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:55 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) 08:35:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)) fcntl$notify(r0, 0x402, 0x80000007) 08:35:55 executing program 5: pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0x1}, &(0x7f0000000280), 0x0) 08:35:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 08:35:55 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x5, [@restrict, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "c3"}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x15d}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:35:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1, 0x0, &(0x7f0000000000)) 08:35:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f000001b500)={0x0, 0x0, &(0x7f000001b480)=[{0x0}, {0x0}], 0x2}, 0x0) 08:35:55 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x0) 08:35:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, 0x0, 0x0) 08:35:56 executing program 4: r0 = socket(0x2, 0x3, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 08:35:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 08:35:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x170, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:56 executing program 0: r0 = socket(0x1, 0x3, 0x0) connect$netlink(r0, &(0x7f0000001280)=@unspec, 0xc) 08:35:56 executing program 4: r0 = socket(0x1, 0x3, 0x0) bind$netlink(r0, 0x0, 0x33) 08:35:56 executing program 1: r0 = socket(0x11, 0x3, 0x0) recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) 08:35:56 executing program 5: pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000280), 0x0) 08:35:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 08:35:56 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/zoneinfo\x00', 0x0, 0x0) 08:35:56 executing program 2: shmget(0x1, 0x4000, 0x4, &(0x7f0000ff0000/0x4000)=nil) 08:35:56 executing program 4: memfd_create(&(0x7f00000001c0)='^\x00', 0x2) 08:35:56 executing program 0: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 08:35:56 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x5]}, 0x8}) 08:35:56 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001940)='/dev/cachefiles\x00', 0xc0a00, 0x0) 08:35:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x171, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:56 executing program 2: get_mempolicy(0x0, &(0x7f0000000040), 0xf51, &(0x7f0000800000/0x800000)=nil, 0x4) 08:35:56 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x118202, 0x0) 08:35:56 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x30) 08:35:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@private1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in6=@mcast2}}, 0xe8) 08:35:57 executing program 2: keyctl$link(0x8, 0x0, 0xfffffffffffffffa) 08:35:57 executing program 1: openat$tun(0xffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xa04658e871060f78, 0x0) 08:35:57 executing program 4: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:'}, &(0x7f0000000140)={0x0, "c54d242ea924eaa60434f8a128199aeeab8ef77a3548a3d59575e7147dbae71be6f7e8eda43f0fc7e58358f96d32b98255f5d5774cff972cd0ea7e4e5836bb19"}, 0x48, 0xfffffffffffffffd) 08:35:57 executing program 5: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=@hat={'permhat ', 0x0, 0x5e, ['+\x00']}, 0x1d) 08:35:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmmsg(r0, &(0x7f0000004a80)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) 08:35:57 executing program 1: getrusage(0x1, &(0x7f0000000240)) 08:35:57 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 891.921429] audit: type=1400 audit(1617957357.197:3459): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=16491 comm="syz-executor.5" 08:35:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x172, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:57 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 08:35:57 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) 08:35:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4e02}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 08:35:57 executing program 4: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x0) 08:35:57 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xd) 08:35:57 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x59f, 0x2100c0) 08:35:57 executing program 2: perf_event_open(&(0x7f0000002200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f00000066c0)=[{{0x0, 0x0, 0x0, 0xfffffffffffffe87}}], 0x1, 0x0, 0x0) 08:35:58 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', 0x0, 0xfffffffffffffe8a, 0x0) 08:35:58 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 08:35:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) 08:35:58 executing program 2: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0x10) r2 = dup2(r1, r0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) 08:35:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x173, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:58 executing program 1: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000240)=@hat={'permhat '}, 0x1b) 08:35:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001500)={0x2, &(0x7f00000014c0)=[{0x4, 0x0, 0x0, 0x400000}, {0x6}]}) 08:35:58 executing program 2: ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, 0x0) 08:35:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 08:35:58 executing program 1: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x40) 08:35:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x25c, 0xc8, 0xffffffff, 0xffffffff, 0xc8, 0xffffffff, 0x1f0, 0xffffffff, 0xffffffff, 0x1f0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa4, 0xc8}, @common=@unspec=@AUDIT={0x24, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2b8) 08:35:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, 0x0) 08:35:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000006bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 08:35:58 executing program 5: memfd_create(&(0x7f0000000000)='/dev/bsg\x00', 0x5) 08:35:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000008040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x102, 0x0) 08:35:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xc5c4, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 892.941908] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 893.322162] audit: type=1326 audit(1617957358.597:3460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16549 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0x0 08:35:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x174, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x108180) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/136, 0x88}], 0x1) 08:35:58 executing program 4: r0 = openat$tun(0xffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) 08:35:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105002) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 08:35:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57b1145c201ff5e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:58 executing program 4: openat$thread_pidfd(0xffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = inotify_init1(0x80000) dup2(r0, r1) 08:35:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x20800) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 08:35:59 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x10) 08:35:59 executing program 2: socketpair(0x7c, 0x0, 0x0, 0x0) 08:35:59 executing program 5: socketpair(0x10, 0x2, 0xb5, 0x0) 08:35:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a19c935579a655d70a615ce8f390794fbf8e9416e2f2884d8657bbe815ece3d43b3944e86eb13e245732a8ed0a9a96934f7c4e24bd24644fa65e2b461bc93c31dccf80dab0903539bd7e25f691f975ae"}, 0xd8) 08:35:59 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc01cf509, 0x0) 08:35:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 08:35:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x175, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:35:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 08:35:59 executing program 5: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f00000001c0)=@known='user.incfs.metadata\x00', 0x0, 0x0, 0x0) 08:35:59 executing program 4: ioperm(0x0, 0x0, 0x0) 08:35:59 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:35:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) 08:35:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 08:35:59 executing program 0: socketpair(0x1, 0x0, 0x4, 0x0) 08:35:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, 0x0) 08:35:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)) 08:35:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) 08:35:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0xbd40) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 08:36:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x176, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:00 executing program 5: setresuid(0xee00, 0xee01, 0x0) 08:36:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 08:36:00 executing program 0: clock_getres(0x797ddbbccd110b2c, 0x0) 08:36:00 executing program 5: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) mlockall(0x3) 08:36:00 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2400000021000100000000000000000002000000000000000800000008000b00ffff0000"], 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:36:00 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000005540)={0x0, @xdp, @l2={0x1f, 0x0, @none}, @rc={0x1f, @none}}) 08:36:00 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:36:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000400)) 08:36:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x177, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:00 executing program 5: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x208001, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 08:36:00 executing program 2: openat$ipvs(0xffffff9c, &(0x7f0000000f80)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 08:36:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, 0x0) 08:36:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) 08:36:00 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) r1 = openat$pfkey(0xffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x208001, 0x0) fcntl$dupfd(r1, 0x0, r0) 08:36:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001240)) 08:36:00 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 08:36:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000090c0)={0x0, 0x0, &(0x7f0000009080)={&(0x7f0000008100)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x824, 0x8, 0x0, 0x1, [{0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private0}}]}, {0x2a0, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x284, 0x9, 0x0, 0x1, [{0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8}]}, {0x554, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @private2}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x4f4, 0x9, 0x0, 0x1, [{0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_FLAGS={0x8}]}]}, @WGDEVICE_A_PEERS={0x158, 0x8, 0x0, 0x1, [{0xf0, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0xcc, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}]}]}, {0x64, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c6798e0ad0ef88c8501f010fee5c1ef6a84442d913275a9d399d1025a3f502ce"}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}, @WGDEVICE_A_PEERS={0x1b4, 0x8, 0x0, 0x1, [{0x17c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "f3ef27d95a80633333f5b3290b296fb55d3879e64dabcfd7f1cf92f61f3d3f42"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x144, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @private}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}]}]}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_PEERS={0x358, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}]}, {0x324, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x9c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x284, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @multicast1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 08:36:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={0x0, @rc={0x1f, @fixed}, @rc={0x1f, @none}, @phonet}) 08:36:01 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:36:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000000)="9044"}) 08:36:01 executing program 2: mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 08:36:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x178, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:01 executing program 2: openat$hwrng(0xffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101200, 0x0) 08:36:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg1\x00'}) 08:36:01 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(r0) write$P9_RSYMLINK(r1, 0x0, 0x0) 08:36:01 executing program 2: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) 08:36:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000001800)={0x77359400}) 08:36:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), 0x14) 08:36:01 executing program 0: r0 = openat$bsg(0xffffff9c, &(0x7f0000000380)='/dev/bsg\x00', 0x0, 0x0) write$tun(r0, 0x0, 0x0) 08:36:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000180)=""/89) 08:36:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x40242) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 08:36:01 executing program 4: capget(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) 08:36:01 executing program 1: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(r0) 08:36:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x179, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@tfcpad={0x8}]}, 0xbc}}, 0x0) 08:36:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0xdc618b1d5ebaa969) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 08:36:01 executing program 5: r0 = openat$bsg(0xffffff9c, &(0x7f000000fe40)='/dev/bsg\x00', 0x381c43, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 08:36:01 executing program 1: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 08:36:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = inotify_init1(0x0) r2 = dup2(r0, r1) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000000)) [ 896.326098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 08:36:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 08:36:01 executing program 1: request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='!\x00', 0x0) 08:36:01 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x8e40) 08:36:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f00000066c0)=[{{0x0, 0x0, 0x0, 0x49}}], 0x1, 0x0, 0x0) 08:36:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) fsetxattr(r0, 0x0, 0x0, 0x0, 0x6) 08:36:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000d40)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000000c0)=""/191) 08:36:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000007140)={'ip6_vti0\x00', 0x0}) 08:36:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000640)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000680)=""/251) 08:36:01 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffa) 08:36:01 executing program 1: openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 08:36:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3f, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 08:36:02 executing program 5: openat$pfkey(0xffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x14000, 0x0) 08:36:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_addrs=@can}) 08:36:02 executing program 1: r0 = openat$pfkey(0xffffff9c, &(0x7f0000001ec0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) 08:36:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f000000a080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2042, 0x0) 08:36:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{}, "428d39f0a3747d1d", "b256d2a0f2dec4030bd8f8ab883ffed7", "6593a76f", "abe2bc8a09461975"}, 0x28) 08:36:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x0, 0x2000000000903, 0xa}, 0x20) 08:36:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:02 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:02 executing program 4: openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000080), 0x0, &(0x7f0000000100)) 08:36:02 executing program 5: r0 = openat$bsg(0xffffff9c, &(0x7f000000fe40)='/dev/bsg\x00', 0x381c43, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 08:36:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) dup2(r1, r0) 08:36:02 executing program 0: request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0xfffffffffffffffa) 08:36:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 08:36:02 executing program 2: request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0) 08:36:02 executing program 4: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) 08:36:02 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000140)={'syztnl1\x00', 0x0}) 08:36:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2080}, 0x0, 0xf, 0xffffffffffffffff, 0x0) 08:36:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:02 executing program 1: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 08:36:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5421, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:02 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f000000d2c0)='/dev/vcsu\x00', 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000016300)={&(0x7f0000016200), 0xc, &(0x7f00000162c0)={&(0x7f0000016280)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 08:36:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 08:36:02 executing program 4: setgid(0xee01) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) 08:36:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f00000029c0)=[{0x0}, {&(0x7f00000026c0)="19", 0x1}, {0x0}, {&(0x7f0000002800)=')', 0x1}], 0x4}}], 0x1, 0x0) 08:36:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c8}, 0x1, 0x0, 0x700}, 0x0) 08:36:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0}, 0x0) 08:36:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x33fe0}}, 0x0) 08:36:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xffffffffffffffe1, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022c4000000000000000000000080021470ebb13bd4e5b02c7503030303a30303a31302e30000000000d0087006c325f64726f7073000000000500830000000000"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x4801) 08:36:02 executing program 2: r0 = shmget(0x3, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x6000) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7, 0xffffffffffffffff) 08:36:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:03 executing program 1: timer_create(0x0, &(0x7f00000006c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000700)) timer_settime(0x0, 0x0, &(0x7f0000000740)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 08:36:03 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/vcsu\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003000)='ethtool\x00', r0) 08:36:03 executing program 4: openat$vcsu(0xffffffffffffff9c, 0x0, 0x6c0001, 0x0) 08:36:03 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="580000006404"], 0x58}}, 0x0) 08:36:03 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x14, 0x0, &(0x7f0000000400)) 08:36:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x300, 'macvlan1\x00'}) 08:36:03 executing program 5: r0 = shmget(0x2, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) 08:36:03 executing program 0: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "83870ea225afb54f80ea2e9577a721236af2061493e506922d8fd1c5efad895b59eb802429c0af7ab308a69068d94e88980a3736be8c59f022fd9fc22d509c23"}, 0x48, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r0) 08:36:03 executing program 2: sched_rr_get_interval(0x0, &(0x7f00000000c0)) fork() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 08:36:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 08:36:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 08:36:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:03 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 08:36:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', r0) 08:36:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:36:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x2, 0xe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x38}}, 0x0) 08:36:03 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x212800, 0x0) 08:36:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x2, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, &(0x7f0000001e00)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @dev}}}, @ip_tos_int={{0x14}}], 0x38}}], 0x1, 0x0) 08:36:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2283, &(0x7f0000000040)={0xfd57, 0x0, 0x0, "e06a4af0d8c07d2a0e7b6dfd81b13be3aa160719dcf4869b9b"}) 08:36:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @loopback}}}], 0x20}}, {{&(0x7f00000005c0)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x2, 0x0) 08:36:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8993, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000100)={'veth0_to_bond\x00', @ifru_ivalue}) 08:36:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:03 executing program 2: fork() waitid(0x0, 0x0, &(0x7f0000000040), 0x9, &(0x7f00000000c0)) 08:36:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2283, &(0x7f0000000040)) 08:36:03 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002300)={0x2020}, 0xffffff93) 08:36:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@tipc=@name, 0x80, 0x0}, 0x0) 08:36:03 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2282, &(0x7f0000000040)) 08:36:04 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5460, &(0x7f0000000240)={'tunl0\x00', 0x0}) 08:36:04 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/263) 08:36:04 executing program 4: sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x26, 0x0, 0x0, &(0x7f0000000100)) 08:36:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000440)={&(0x7f0000000180), 0xc, &(0x7f0000000400)={0x0}}, 0x0) 08:36:04 executing program 2: socketpair(0x2, 0xa, 0xffffffc8, &(0x7f0000000000)) 08:36:04 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {r0, r1+60000000}}, 0x0) timer_create(0x2, 0x0, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f00000000c0)={{}, {0x0, r3+60000000}}, 0x0) 08:36:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x180, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00'}) 08:36:04 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) 08:36:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x18}, 0x0) 08:36:04 executing program 0: shmget(0x0, 0x2000, 0x78000ba2, &(0x7f0000ffe000/0x2000)=nil) 08:36:04 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/vcsu\x00', 0x200400, 0x0) 08:36:04 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000004a00)={0x0, 0x0, &(0x7f00000049c0)={&(0x7f0000004980)={0x10}, 0x10}}, 0x0) recvmsg(r0, &(0x7f00000009c0)={&(0x7f00000003c0)=@pppol2tpv3, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/42, 0x2a}, 0x0) 08:36:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2272, &(0x7f0000000040)) 08:36:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, 0x0, 0x0) 08:36:04 executing program 2: getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) fork() pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 08:36:04 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x1800) 08:36:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x541b, 0x0) 08:36:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x181, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c8}, 0x1, 0x0, 0x1000000}, 0x0) 08:36:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5385, &(0x7f0000000040)={0x10, 0x0, 0x0, "e06a4af0d8c07d2a0e7b6dfd81b13be3"}) 08:36:04 executing program 1: getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 08:36:04 executing program 2: r0 = shmget(0x2, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x500a) 08:36:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:04 executing program 2: r0 = shmget(0x1, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x5000) 08:36:04 executing program 1: openat$thread_pidfd(0xffffff9c, &(0x7f0000000100)='/proc/thread-self\x00', 0x0, 0x0) 08:36:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f0000000040)) 08:36:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0xffff000000000000}}, 0x0) 08:36:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x1) 08:36:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{&(0x7f0000002640)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x1, 0x0) 08:36:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x182, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02078009390007"], 0x1c8}}, 0x0) 08:36:05 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x58}}, 0x0) 08:36:05 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[@timestamping={{0x14}}, @timestamping={{0x14}}], 0x30}, 0x0) 08:36:05 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f0000000040)={0xfd57, 0x0, 0x0, "e06a4af0d8c07d2a0e7b6dfd81b13be3aa160719dcf4869b9b"}) 08:36:05 executing program 2: syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 08:36:05 executing program 5: r0 = shmget(0x2, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x5000) 08:36:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x44) 08:36:05 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000009c0)='NLBL_UNLBL\x00', 0xffffffffffffffff) 08:36:05 executing program 4: r0 = shmget(0x3, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x6000) 08:36:05 executing program 5: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0xffffffffffffffff) 08:36:05 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) r0 = shmget(0x2, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x5000) 08:36:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x183, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:05 executing program 0: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001000)=""/10) 08:36:05 executing program 1: add_key$user(&(0x7f0000000140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000040)='\x00', 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, r0) 08:36:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0xc0189436, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8903, &(0x7f0000000000)={0x1, 'macvlan1\x00'}) 08:36:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0xa002, 0x0) write$tun(r0, 0x0, 0xc3) 08:36:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{&(0x7f0000002640)={0x2, 0x0, @dev}, 0x10, &(0x7f00000029c0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 08:36:05 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0, 0xf00}}, 0x0) 08:36:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x80, 0x0) read$FUSE(r0, &(0x7f0000002300)={0x2020}, 0xffffff93) 08:36:05 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000240)={'tunl0\x00', 0x0}) 08:36:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 08:36:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2203, &(0x7f0000000040)) 08:36:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x184, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf) 08:36:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:06 executing program 2: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) setgid(0xee01) 08:36:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000003400)={0x0, 0x0, 0x0}, 0x0) 08:36:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180)='nl802154\x00', r0) 08:36:06 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, &(0x7f00000001c0)) 08:36:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002680)="82a7fdbcfd737402dc9ff50e8704d9", 0xf}, {&(0x7f00000026c0)="19", 0x1}], 0x2}}], 0x1, 0x0) 08:36:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02078009390000002dbd7000fddbdf250400040002000000f9ffffffffffffff0600000000000000000000000100000003001d"], 0x1c8}}, 0x0) 08:36:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2011}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:36:06 executing program 0: syz_open_dev$vcsa(&(0x7f00000006c0)='/dev/vcsa#\x00', 0x0, 0x6802) 08:36:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x185, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:06 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x5c1) 08:36:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227f, &(0x7f0000000040)) 08:36:06 executing program 4: mq_open(&(0x7f0000000380)='team0\x80Mr\xc6\xbb\x01\xa5\xf5sb\x04\x01C\xe8\x95\v\x113hc\x03gd\x17f\b\xcfr\x9c\x83\x18\x9eCn\x94\x90\xd6g\x83\xab\xcaV\x18\f2X\xf6S\x17\xbc\xf9', 0x0, 0x0, 0x0) 08:36:06 executing program 5: openat$vcsu(0xffffffffffffff9c, 0x0, 0xd3b280, 0x0) 08:36:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c8}, 0x1, 0x0, 0xffffff7f}, 0x0) 08:36:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0xfffffdef}}, 0x0) 08:36:06 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, 0x0, 0x0) 08:36:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:06 executing program 4: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) setgid(0x0) 08:36:06 executing program 0: pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x104000, 0x2, 0xffffffffffffffff) 08:36:06 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f00000047c0)='/dev/vcsu\x00', 0xc001, 0x0) 08:36:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x186, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f0000000040)) 08:36:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8911, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:06 executing program 1: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) syslog(0x0, 0x0, 0x0) 08:36:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f0000000040)) 08:36:06 executing program 0: syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x48501) 08:36:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002680)="82a7fdbcfd737402dc9ff50e8704", 0xe}, {&(0x7f00000026c0)="19", 0x1}, {0x0}, {&(0x7f0000002800)=')', 0x1}], 0x4}}], 0x1, 0x0) 08:36:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0207"], 0x1c8}}, 0x0) 08:36:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2285, &(0x7f0000000040)) 08:36:06 executing program 5: openat$vcsu(0xffffffffffffff9c, 0x0, 0x6a001, 0x0) 08:36:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8923, &(0x7f0000000240)={'syztnl1\x00', 0x0}) 08:36:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000640)='NLBL_UNLBL\x00', r0) 08:36:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x187, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:07 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20}, 0x20}}, 0x0) 08:36:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000004c0)='NLBL_UNLBL\x00', r0) 08:36:07 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f000000d2c0)='/dev/vcsu\x00', 0x0, 0x0) 08:36:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40000043) 08:36:07 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f000000d2c0)='/dev/vcsu\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f000000d400)={""/35414}, 0x8c00) 08:36:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) 08:36:07 executing program 4: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) 08:36:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000005280)=""/4112, 0x1010}], 0x2}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef5680277bec00123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x0) 08:36:07 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000840)={&(0x7f0000000480)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 08:36:07 executing program 0: r0 = fanotify_init(0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 08:36:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000004c0)='NLBL_UNLBL\x00', r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000009c0)='NLBL_UNLBL\x00', r0) 08:36:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x188, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:07 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) 08:36:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:36:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa078b25db4cb904e473730e55cff26d1b0e000900140000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 08:36:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x7, 0x55, 0x5, 0x5, 0x0, 0x7ff, 0x800, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2e, 0x0, @perf_bp={0x0, 0x9}, 0x4, 0x5, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r2, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2, 0x100, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x10220}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000035) 08:36:07 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x80, 0x0, 0x0, 0x0, 0x12b8}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x21, &(0x7f0000000000), 0x0, 0x34000}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:36:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x33000) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 08:36:07 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001e00), 0x0, &(0x7f0000001e80)=""/165, 0xa5}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef5680277bec00123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 08:36:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) close(r1) 08:36:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x189, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:08 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) gettid() perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="140000003300055bd20000648c63940d0424fc60", 0x14}], 0x1}, 0x0) 08:36:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000004c0)='NLBL_UNLBL\x00', r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 08:36:08 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8915, &(0x7f00000007c0)={'veth1_macvtap\x00', @link_local}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x891a, &(0x7f00000007c0)={'geneve1\x00', @link_local}) 08:36:08 executing program 1: r0 = socket$kcm(0xa, 0x801, 0x88) socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f00000002c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f000001a600)=[{&(0x7f0000000300)='$', 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040d80ecdb4cb92e0a480e000d000000e8bd6efb250309000e002403240248ff056c05001206", 0x5b}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000002c80)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="8b90c0c63a9952537753db13bc3a2abe6d85f812c4a1f1857f813373957514b0cb3ca796941adf26e3aa9d64c62ad5b03c337a9b4f5412a2a35241f1c2db4e8b9596681148d65fe5febd6c34981293783b3110327fefcdb42ca23f298fc94ac0a6d5a53083afb302ec66b5bf59e98e7cafa38817e93c5d7eb60954a93b208f2c5187ff861a", 0x85}, {&(0x7f0000000400)="b3f65acd596d5cf313f034b2da8b68e386e7ac580762bea910d1e12dffc3d2c11dab819b9108c0172b7963780cb9295c7846811ad176c74de790d472efc1f68800a387b7169388529f9b1f45bb956520e1caf9da3cd99066595d9beb41d7d0e7358a680efc83262b5f7a40b7ad326d47455cdef81e1ccc65bb18ef409c1d969163cd64e4eebb748d2370aba2c6e5978dcedba2e27efb1f32e4a276ebbd3d58df7483", 0xa2}, {&(0x7f00000004c0)="a222316a8bd36454a61d29828f2b103be45a166315e42f02eeeb290b8a50b7bb58a632969ddec5e7df4e86ed2d72b72b39ae4d4af63ce6855c5c71ae1746c74f69f2ed9b7963a04d8f9d70fe3398383367185dc4c7c3fe27974f7c0b067c2f11ad5f3b740a8d68d0f05d10e9617616cab8e1a55bb4c2eefc614c21ec8bee79a489b3ffe8394b2e6f67d763a5d18622b204ce7eb06c0603eafb67", 0x9a}, {&(0x7f00000008c0)="43ed17f0f9442cf8426e084bed930260fbacb8de97f488ac832f2cb36d6826c99fa6593c6b9c946ff25ca6a5adc5c2323d5806e9fc705de6d43f974e0e9ca4b1576b4b5f2b785abb34ffb828cbef4cf48a26ff2bb67cbf51227dfb815f537dfe43b8a4e1e7426eaec044acd288dd0ef2cc381344f0e591b020ac058f329564ad222e2f916980a2", 0x87}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="b3759861f49792db0c931a76faea00837ecfa992b5c3933dd0dc2e53ef394f44ebe19a5534a4df0763796b82bc123782fa9f33c74da1fca566a0ed4ae18623c8f7c718516856cf2989269bc745912431ccca24cb95f146c96f133ce78034a84560a23610916a78be9bb2ddc994da55f2c2d1fa8912fd4fcf15a681d48406c3def1abeb15daebd778363c68aa01602bac33e0ba1b1929ef04bf6d1ab431cba89ad2921c72ec2068f7da5be81836ce364572ed911ae84301a7ef86d2b94516eacae163d1ff66644fc182dcd04e398a7e0494e62200ddfd494d9cde44d70ae038cd698f21", 0xe3}], 0x6, &(0x7f0000001a80)=[{0x1010, 0x113, 0xa9f20, "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"}, {0xd0, 0x60ddc3721e527363, 0x81, "880cfcfe7ebcdef2b679d43df3f3425809afc92caa941bb127b527f88d2107ac4a709813863e9b612086e73bdec22613faf77d53eda57199965eaa4df2d4247d0d231fe52c0b3510cebf6c8580609d69ce3d0f6a87384eaa4ebb034fb75a85ec83134655eeab2ca74e16cb49ab731efa5969230c352e925aa644d3d21bee5da75ed0e001e2977dc03c3b8c007037e9b7fd2f338c3cb88fec1aaaeadba0afefe5160ab6882084b50c090c9f6c75e25c7cd73c20de5600b5c0b8d6c7a05b6e"}, {0xf8, 0xff, 0x2, "974c4631ed27e1f220384200279e13ee4dc345349852e8ce5579478070b639dc6bba581365a25e4685403e2ddb4b287f7e6d9d4e9820fdcc5b0e9c8ce7f6a1a3c51f6649f27d3906ac2c790c06c5416e3dcd834808be0f5562db7b9728d565cda1d1d06522ec65a84ed201b2c1649c06966a58855cae87f2126895392819111be7abef3ca2a45759856de5234bcd0b49ddb3e75de4380a4da88179925765c741b1185cf24f185b35532471071ba0d923754af97565013e8bf4fdcaf998e20c1337250c9596181c608335a39e3c37ef4461201118810915d205dd748521f3b1915daa"}], 0x11d8}, 0x8050) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="8a8981f8af8f533f33f38a0e711b780ab2543afd8b7e079c5e96a36d7898d23967572fd60088dd329860fabdecc200d2af8065f84626262b756316e3f805648b9f2998ae77054d3ba2c5a23d0c3ed7f36155e8f19d685bd7bf62d736df3773f1a742a2b914c9d3f7fe8d74dff854b89efe0ce54f3e9a63bf861c1dcb9fba26407f2c216b0678031388834a", 0x8b}, {&(0x7f00000000c0)="e8ec43934b266cf20b0bd5f96a4990e1fe24e17d9ba7a6dad4b4d1d7e9f241eea708f85623efc038b230769aecb2075c7bcfbf21ce1f448bee2f651004ff7cef11412ec40a84c3994f9e34e2ab9d97b86bf08e64e53b7b32dd376d1131021cfb0e3325ad458978ddd62533f627382e34cb181c3a344b86a09002b6f5e5ccce", 0x7f}], 0x2, &(0x7f00000005c0)=[{0x30, 0x10a, 0x407, "dd3959d97351e778fd7a105461004c35d07fe72b63a705b9a115"}, {0xc0, 0x119, 0x8, "154961814294e6a4006f37afaa259076567abea07238d40fe365887400e08dee25ba332464fcde1d0607b369e57647fa5f3a73d2b805bf4ff0d9523182b4af68464c0f5cc120e34e1253ad5f811e4034edf687a318a297eb6b46692b92d6ff32ae4ad6a5629d250294c3b1bafb840427248efeb5e0d168618711eccf78128777a8d52a1a3f188db1e9e16d5ec851d7ec5c83a7caaf47a69b8b664933230173ea1ca5fa8711e91d89830fee1c5b6b8f"}, {0x100, 0x103, 0x1, "87f1336b51ef5a7d6cccec8bf16ca4463407b359396944a791e1ba914149b93a6f851020b92ce06574e6f54ec5cc1db1447c9cd6c776a6b485fbd455e3782e33866722e1e779ef2742be89f793e744f588d1bde7121173ee9c19c1266f7f4491a0a8024436b019f74e2a4ef4b16bc79af2d6a3ec0a92e1292245b12c005b74c174804c3b1ede9f2a353afcb0ea9d1f4aaec61532556330ce3e923582ec964765f64cb2c40dbd69cd9c6e8df153455d8da852a8038537551aa0e83f01395d87d9caa2e92ded2b47c9dda3c789d8d0f6d6660941881610945cf714c47efe9faacfb480288409d1030ec7"}, {0xe0, 0x113, 0x7, "1c104507364311ed921cbe17f4cc9fcf1b804d0d0f367bfa1384abb166dbc8dfda744a467d6c2c059ebc670691f93c642e28f98a13c7d56ca9c1a75abe3aeb742162e7f0ebea378044ecfaaec94fdb3407c756da8bef012db18d50896035a36330150d2735b1ba9b5f1dc7de6b2db60688ff2e4ca83a23b9512825742a5e6eecced6c400e629a1680638bd9429e00cb4dc46e30633109a432c3c55bc740da951cb234a41462feedc1282155878caddbbeaa904797930c0d5ca689096b79da5f7d8548313e48b3de0c5"}], 0x2d0}, 0x4891) 08:36:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xe80, 0xfd000000, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 08:36:08 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000740)="02", 0x1}], 0x1}, 0x40840) [ 903.045724] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 08:36:08 executing program 2: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x12, &(0x7f00000000c0)) 08:36:08 executing program 0: syz_open_dev$evdev(&(0x7f00000013c0)='/dev/input/event#\x00', 0x0, 0x101200) 08:36:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001500)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000001540)=""/47) 08:36:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x4020940d, 0x0) 08:36:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x1f, 0x0, 0x0}) 08:36:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001300)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/98) 08:36:08 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) 08:36:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) open(&(0x7f0000000080)='./bus\x00', 0x4c042, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000940)='./bus\x00', &(0x7f0000000980)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) 08:36:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x4004743b, 0x0) 08:36:08 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0x100, 0x0, 0x0, 'queue1\x00'}) [ 903.482641] audit: type=1326 audit(1617957368.757:3461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17277 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:09 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') 08:36:09 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/67) 08:36:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005a700)={0x0, 0x0, "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", "579b08f86b51482aef18f0c6d92bda6b892da30ad0852de701c4764697d41959a7c207aa47d753c2e80a9a0aa8a45dc06fe93e191b8271ffc4c9fbed90179577b6a4c574146c763d4d1f98bf040551613686dbab354726ab8be95f6db1440ef1a277c4373d8c7763b392d8bd8a83d5cf874c345ca1a629e9d2548285cb802f3286fe71e20ac123e58501388860e3de4feb7da62ae14b2f40647194937dff0774559ed0ceeac977bf48dabd0320f8ea224329a31c7a5b1fbb236a89db953168357ac64f09adc94368e4a519ca708fa156fb219849505419e6cd3300a8d3b18546c48c9e1edc796a6c750189dd1e8955097526ac623c80fa8e193cdc586d491c75e99dc99350608e49e3a0372e83225d04919869ce93ecded1ecee2853739f837620e64318a73e35fa1ecb15ccada3edaf5783437d987e36bf68b3f7fa0122de5c01f80ad728eee6d413ec3e9811e0097dba92b124c2a6f36f3e0e29f3310749ffb7b30c2e858a736b8aae1fdad49877d23c4f682c7b89666e9038694601a6d836d2c38c09fd83d8473cc2794d6284f13f9b4b9e6af78019060331371794ba9885914f93a5641c52d0ae948a8cb0a4c17739f839911d74408e1b7b33566c723531942908fbd22d6eb764e6681bd7cba8acc617b509185bf09970b5766549a9aa121b47daa6fcc5a5bd8d3383777614373bcc487a1c84a8180f4b4a11c08b8202e9aef96f99345d01c6ad7408f319b62a50ceb7eb47928444c682553218325cd80df97804b0201c67798437da8a0c4e8eddd5362a5e9869172a0ea5f15a5e87c6c486ac2cfb2544de3ea9251125ffe2f6f5f9014e8f4aa237896270cc51e2d0376019c28a1c750bd1e3882ed5021e0b72d32d5bbdddb3b272742f01f4b7aeeef21e9444f9b003ce4c4f782a4212eb5f66481f10dda88c6f839c1037b00a65f8fba8e461bfb3d76ebe67269bf03c1de51bce0b6cfbc8ed8ac7ddba0d023cd0bf9664eefd30761d95d7f321f438bed94141bc7ec886a9a1fc16410ce66b349c06fd2faa38f9bfca3b41759ba93ed64927f99590c271bbf12b050a2f21c700777d888dd99c1764e5fc6761e9084e32b976a445125116e9f554192430364f9d2581eba4161dc19810d5ed286c9c1fa3a7d4b2d32e92c254043a0235ac85e0ad3b9194536a735406d803d58c2b978310e3b3913beb330e687b1fd3f87b857e7f6f1b58df93c3959ff0d9eb1a299a9f50743fd5c9f983911e0954dcbed2b08149a1a28293b97073651ce9ad904044cda25b9c9d4aa1d8c1922e398db40270254434c9bc68402ae80696724396884ecfc2ea6e75b53a95858259cbddfd754f8f214367e4d382179b805360f6528cd9e8d7d44892d2b3572aabff8403682c8a3b3a64b27714800ad1832d7a4352048534cdb88d46997a48a3f140e44244a6d2c1d391e1ac8ae52367d6d844fcb49fb9ae78a538f4c186122e35d9258a82dc1d5fbaa4eea8386e1b4de917630b7d0b99522668cd2db2bbcc27d9f3016f5ddee202684c52e7ce1b0838be1aaaf890682ffc56c273cc609ce590d9aff01221d63d580e92e69d3f355acc43c67de6806c83799735996b26977e0a2824349f6e6f5cb3d1ac4c4ccf41fd33b13a70cd61f6ac3a8e97307f57c9e3cf0ccf3313bb36329f2c29216024f6cdd3e6d70d7837da139624262abeb56a8fb933a8cdfca60655a0b29321ce8f78c4b2fb8d2bae662b4a52ae2db63a122e3ff54e32c5d52653809197c6c7662616ad082d7a4bd37c926e9d269acbfa97245eb25df3b0165489b49099c6b4352afa3afc7a5fff4b69e0970fdeb8acb0b7f7e0ec55609f22b6c2a1f57e373b9ce3bfb6894ccab119ab7715dc38fbe6ab2601f5c5efe52da5176376ceef2d66fcd8eab58cf11534760a071cb84b9045e777908cc42aea20b527b1303074d34a00a6fdb44a75d51651fc2a246f1185372bb0914b43c197dfa217b7bc209e19213e824458161bfe115d0b0b8fff5ba55f1f7a61045238ec3da57ae6d65a761f2b83eacb1deaa810a4bf3e52ba4283e0ba5d4b5705364f06aa06f3bd589305407f0a5179002ea90c94e72540a6a514f168eac71209e2bb4f6ae98117ad93f450af49f383a2a51137df56156a2123ec34631107fed73f36670700d5edb8b2d1ef57343bc10c6449d036469fa359777a073c6970bf7fbc55453dfcc0b86fb853459d7f32cf92613fb557f1ae90aa79cac6c90d503be96288d0ce194536b24f40eb73fa2b31d278f2692980a99d9744877c73ff77218ea6ccd658791dddc8ef492d3ccfcc9af8639d6ee6d454e15fa8d5acc80c86b92be9239b5f992e1a89df14002d709acbde345a25a35cadb00ae3886c47d4fa4e6b320a1c6d6f3bee0df84cad8c2d3a8399c36de3e4cd0ea9e32c1ceaeb8b20cf5bf7999822c5967babc9d5697dfa92a62449fcccec2b727636f0c89faca5a1cf832852ddac035782f47752603e372cc546bb1d2b1dcbdf2d523b2b24d00712d752af74444a9b8c470a4d4d0e948708d5d1be1644df3fdbe983ddd9fcae0d9fca7a400d16ccdd4df4430b0a9cd5cbe134717a4980f4a3280b0b1ee60980afae72c4e093048a7d452f22423f922df023fd4317dcd4a34bacb4d4d9ea0ce50a1f8ae4306ca3807d0a5e2d300a3bb29df9b11d0806cc21c159b4eca6a8f6def4c6ad874dc43c919d96f6d7dee01049accb3d4278b4d5b40b1043f6c1dafaac54718f91cd1988cabac0247ff910ee681fbeafda5d483f92777658a75988919504bec748c3ad8d980c7f3fda570067eb9289d419d1ccafea1ff0bbebbd4e0d952d8bdeeae5e0db6f04e22f97d509eadd2eeafae69e26643bb70ee7824f1db180b99831187fa75bd197b1b588c85b56a8bad330c2fabf190489ee468a8d2d086be0df0d0c21c4c14ad3fc337c891d5807ff869ff8244ca2fdf21ef39a57fd72879ddeeb172ccab36a75bbd69fff6f965274325118d618735aa0e866530e76a3a335eefb3d7a7fe4d579386467a5c8414120cb2bee2d00a3ea202063d5a73846a5225d796d724d43c8e27ac96d3fec467610c3580ec6031b2e402e416fa1a5aa1d9ae7b5a0cb4883eefa42c39337ac4ef5d78544088437430874575769067584eee0404c56a733a0b9b0553f48f087c561629eb72ae5329461eceddfe7af04c973724bb5be3d6c2c49193a799affbe7c7d30f96912450b84381cb4ec121f4150bed77c562cf1bb94d376a51ce0cefca9dfbb3d32f485628b29df4195e2a4b347e2c88a2e275b93e2df9a05990f5ff7ab02fe86035608edb1ecbd4a33244528c9fea8cf09c84b02f8a55574126becb83caab46225a63558e77f49a30d12ca243f9d654b85008c1b630fe7e7f2b4a01c0b2aab0ac0b954be5f23b063bc4140a2774ee0ea466bfc43cd803815636fdf440e128757cff3b7f342e7f0ed85e753496cf625838839a2cb8d98736f5084af33d29a41972acc7c9fecce9aae169c7e439258146169757527b7c012d3858873422822e7925d555d735462126441e5f0e765b9270f2504ee22c331f8e3c4bdc8c04e753fb08d2d72122138595c303b75f96ad0efc08a372ccdd63ef84134e5230eaa6f7d8757b375304e0c4ace4c75695f92ad9e8385f5a212fb97a91e1bece30c9ed96b9ca4fff30b7e02cf55f0575e6c8cd98ddc70e937e45cb5cfede1082d3006f7e9a3b5a8efb03db0b33df661889e39f542e57ba44d90297e31ff2bd66d20ccfa70960e80c0a51fecfd2e7280e2a888ec0ab916e17e15093220e4e0455f99a976d480e36ab89e41bf9e2bafbb6d52cbabf0726efcbe6b5db7a3c78d8556e99be029769b5e5216262d81dac35efa52d707893dd5a54b61756606ff16bc65bf84b324405096761811d7e176a82dc0bae74a7f6000d0a3a13b37dcdcd281d2375d757c801eec070a50035f3953666372dee85df4505876f6011b7a1df067e8c3ef415534c90e6e6fd64a9650aa3a5ba7fc8ab0cadefee715eafe6189163dfd2ec0f44c55ae6b273674e8858806cbf1ac801124205be26c2054973c48eff015daeabdd3f7eeb6f4bc1c796abcff01497eefdd743fd0a6638383b356d01dc45e327df53275d90007d9b909bfc6e2d089b40294849fbd6913a284baf2963ed1778daa87730d101fcf2f02c77c5308266e29985245de482f6cb0449733b1979b74a9fc7f0e1618a354a5eba75ab0d957a99687012cae772779b5250d15738e637b067d83124af62964ab8425c9c341565fdc0e659e6bab4dda439849ec45e58871cecd6ea24f54b7c3e5892c2562c426ca3e2d82f904bac0b795a3c473b0bd029a350d1f8088c1ccf863c49cca91b96eab7a1c03a3bfaa3e36262fe91d1bd91e7d84cae41c0d203c713c77fd63a36f072562e8e80372599d8deb686dcb4946cf8b3f22bfc1b24dcdf48d58aef46c8365ea7faad97d5d2f1b83cafa15bb9ea12310f3ee6c65cbf345d7b190ce81a3458624f0e01b79b86a7b1302716328dbb3c5dc288d6e31299fb17591a5540fe2ed9d3d03673864e4f748042ce4d1b45d5c3656742081f5fb8737dfaa61f7d42a121f39ae9e3f6589bb65347e241ca7868646787590f8973a2f37cd99a1223c87f3700c03f2873c292c753e6ddda50aa908a0f00852e3e582d564ec1b0337759c0053db3d7abee0104b1223219d2cf3b2e71a10661f56f994630cd6ddc3249e360eb855713d975c552d0d2d6dc9cb9be04d1f2e302e4043f456205648fd1160c6499ad964ce4a441cdec3ddad7354d93524413e83d86569225f61a7ddeec8a61eb0a942692880b4110bc4c4f6a9d3cbe4d46b28d9c1000e466c9d8a5a15916665d9fdcb0c7e9e3744c9da5ac2b0f15798e142b4e5e42c71282392b288eaf6eb2ea6a4725c39b28e8c0b0cd2c929e19cffd3027727c13a2f539aec0421a64f8db35fa5b4455295c1c5a2ebbb635db7c8f1ef7151b7a4d1b43e8ac23fee87e3e2895610fa7b0a159755a442da525393b97b596bfeb68b65954d49fca441345af912d076c9885a98c12db1421530b236e90d3775fcd8bd89d4f8b4a0b80ec9f8dccc0a90b197674b0570bcdcc2fbebd9982c9989bfd3f450e2537f91b8b293938edd37acfb3c95ccabef423064ef92ea56464fba69a6d2719999d4a1a966d998b69d5bee7f6c06d16924e216f64ba1627864214adf5089a80876dd03278892746485537fe644dc65c0b885a3c3ba4333ad3f84568195f19aac57803b16d2bf1394c69f06a59dcee89fcac5b07d1bf5b64031fe31e4941cfa64dc5a00992a781d4e2064bd8222013e985e6e1db6ff3661ed2fd76f99a2b2b761b40a799c4b31df5a0d77146131d31d891fba9ec5b051b0be964f333988e93c3f370719d47fa66376a718976e65efef498d"}) 08:36:09 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000240)={{0x80}, 'port0\x00'}) 08:36:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:09 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 08:36:09 executing program 1: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100) 08:36:09 executing program 0: pipe2$9p(&(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 08:36:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') [ 904.097157] audit: type=1326 audit(1617957369.367:3462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17309 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000009c0)='net/tcp\x00') syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES32=r0]) 08:36:09 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev\x00') 08:36:09 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4081) 08:36:09 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff}) 08:36:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 904.308849] audit: type=1326 audit(1617957369.587:3463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17277 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:09 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f00000009c0)='net/raw\x00') 08:36:09 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) 08:36:09 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) 08:36:09 executing program 2: write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x4, 0x3, 0x1, "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"}, 0x1010) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)={0xf8, 0x0, 0x300, 0x5f, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x1}, 0x4000014) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x20, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4080}, 0xc0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001340)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x2c, r0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008880}, 0x4000000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001480)='batadv\x00', 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)={0x4c, r1, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x88}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7fffffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4014) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x60000210}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x34, r1, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10004855}, 0x8804) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000016c0)={0x0, @llc={0x1a, 0x10f, 0x5, 0x9, 0x0, 0x2, @broadcast}, @nfc={0x27, 0x1, 0x1, 0x4}, @l2tp={0x2, 0x0, @remote, 0x1}, 0x401, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x7fff, 0x9}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001780)={0x0, @broadcast, @empty}, &(0x7f00000017c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001900)={&(0x7f0000001840)={0x98, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x100}, 0xc000) write$tun(0xffffffffffffffff, &(0x7f0000001980)={@val={0x0, 0x88a2}, @val={0x0, 0x80, 0x7, 0x9729, 0x9, 0x6}, @mpls={[{0x9, 0x0, 0x1}], @generic="5e9ae0c12ee618bc849a5ac4ee12f8be81e4a76711c8799c15c799a7ded43e59b70b4b4738278f6ecfe08e57a86e69fba630502d09e5e15a2eb31d8317305c8f5682278cecba80dc79980bfba100d6d8d60fefe7df87f97fb839c6228988fc81117ed733b19c87e4b4d07e6d843a14b5b0b71d27512c10ac2c50b78f7fc14606c8109864eadb1167fcf453f22c77bc19f2332cdac4049dc374df96480de4bed7fe9d44e93c33741ba4d833c90b0d1b6fd4a096f97b"}}, 0xc7) r4 = syz_mount_image$vfat(&(0x7f0000001a80)='vfat\x00', &(0x7f0000001ac0)='./file0\x00', 0xffffffffffffffe1, 0x7, &(0x7f0000001fc0)=[{&(0x7f0000001b00)="f015bb68172163bc21936e35b8e23b044e1db23fdb83b5b37e9374c7e18d1e0257ee5858f33203e5683353bb941c9115eef52934579abe917116ce2909a67699efe6b67c43d4e05c9cbd5f86b1c6c799a933bde1207989a3b22c3aa8deedd4687f7dac7b2aa91f51ec4d38ee30320b209735d15ec450a2f50289de4e5a8e5f6f90cfe8751e4a98d7b95e8471a53e683e3a0ffa2e67c2c72ef389c16cc8290d074a1963e8aecec5", 0xa7, 0x2}, {&(0x7f0000001bc0)="44003b8bc55318ab4f9f6c212d8ab7943bcaaee8ca1257d725f6ff3a11f9828ea8afd90776a3ba1e7fc3d6fd4f1adb44b164f210fc986280db3062c063c4e73118e2d609527df53e9baaef114b76918880729a531c1c35e2e012935e3664a758d1dec53a13e837531b2b3a00e3c976ae3ea032a914f5fd90d1e0d982012e991877ed679b0caa28f6b6cfa371683968d430cf65d2d5483946c660f5185b47a776f677b0e9e771ac8662d014e3e261d5874d834b49399f4202ef179f036ec2", 0xbe, 0x3}, {&(0x7f0000001c80)="ab7941ddecf072be54ce1a30e401d22860d1faa87e838122f02bd7192de737", 0x1f, 0x4}, {&(0x7f0000001cc0)="d11b090cff02575132ce7c120f2ad8f76c26d63462d0ecdb88721bf3f915fd43540d8a6ac816ec6fa5876b8468d858844d7b5b3dd41752fb0a7721947e6312b07f178b918e8a4ab0b0e04cb2aa065f4ad07d0854a1663becef910d173ab38ccdeaa51795669f9c1cebbf03351265edd7ffbe77c749180034e15ae42ccd47caeda4c53358fb4afd558254051b632ddf30d8c458a90cf64b85f1801393417a0e134e9ea606cce183fa820ae04bbff0317d8dd6dcb16a17015642fdd11d58dd", 0xbe, 0x7}, {&(0x7f0000001d80)="1de68d6b52fe920f42836482199a43118c9ba1fd881422f8b66dab13cb50506bf17925898d12dd7c27451f442d537160301fd92b067ffb908c199552ab2b97a17008149eb3c81bf05ba8841d57ccd0d398ac8a0e14eef59cb3dd04321504c309ca4f6988039cc4134b024b7c423dbd75e8ae2241034cbc265ddbe1629bd6ea9c44a722e380956b2d561c7035f0bdc9facdc459aade470f79d8f9e90b3c453261a8b1544fd73fdbdc55782a8874dfd6da67db28e13ed7ae85b1d20e0489750b0214c6e8fff4b1bb52c44605ff9e48c101aa2305", 0xd3, 0x1b1a}, {&(0x7f0000001e80)="9c5b70e95b8189e3936e72ddce761385d71faeb88c4c00ff1ee76adf43c804686532ddb255725e32b4fd6a71599a047fe451b2e321a0538951ae3b7c84484c8f4882b2be45b5f386a5f3d990f0ac426468c75958143133b609934bcab6887e9628a13095f1af7340c6c1f08132f09a53a18d1920f2fb0f604e7ec1708c667f2d541e56e4f5c3ad57f1e5b352e072f462f4e53ffb8588337ddea2ff3c7409d0", 0x9f, 0x5}, {&(0x7f0000001f40)="a1d44764a5e15d0453c7ad03ca2cdea62a919477f415ee8b3ffcbccc521ef62727f0563952cf660fe171a7024d8439c76bcb39f0da99cd3813dea7ecc6d680af4dc33f87dd361f8a5fc7", 0x4a, 0x1}], 0x200000, &(0x7f0000002080)={[{@utf8no='utf8=0'}, {@nonumtail='nnonumtail=1'}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@iocharset={'iocharset', 0x3d, 'koi8-ru'}}, {@fat=@errors_remount='errors=remount-ro'}, {@iocharset={'iocharset', 0x3d, 'cp865'}}, {@shortname_win95='shortname=win95'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, 'pci\x00'}}, {@subj_user={'subj_user'}}, {@uid_lt={'uid<'}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000002140)={@id={0x2, 0x0, @b='\x91*\xe5\x10\xa4Xr:\x83\x9a\x9f\xadp\x158\xac'}}) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f0000002180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002240)={&(0x7f00000021c0)={0x5c, r0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x49}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x17}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffff4cf6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xd3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) syz_genetlink_get_family_id$tipc2(&(0x7f0000002400)='TIPCv2\x00', 0xffffffffffffffff) 08:36:09 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 08:36:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2302"], 0x3e) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 904.929373] audit: type=1326 audit(1617957370.207:3464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17309 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:10 executing program 4: execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x100) 08:36:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r0, 0x0, r2) 08:36:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='dmode=0x0000000000000000,utf8']) 08:36:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 08:36:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:10 executing program 2: syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x9008, &(0x7f0000000280)) 08:36:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) rename(0x0, 0x0) 08:36:10 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x0, 0x2}) 08:36:10 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 08:36:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x400, &(0x7f0000000580)={[{@uni_xlateno='uni_xlate=0'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}], [{@smackfsroot={'smackfsroot', 0x3d, '\\:(#'}}, {@seclabel='seclabel'}]}) [ 905.192369] audit: type=1326 audit(1617957370.467:3465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 905.244573] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 905.268229] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 905.283514] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 905.292653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 905.304631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 905.334789] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 905.342587] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 905.362716] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 905.376893] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 905.385884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 906.017381] audit: type=1326 audit(1617957371.287:3466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17365 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:12 executing program 2: syz_mount_image$vfat(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000001300)=[{&(0x7f0000000300)="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", 0xffd, 0x3}], 0x0, 0x0) 08:36:12 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000402) 08:36:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x18f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2302"], 0x3e) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:36:12 executing program 4: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') syz_mount_image$nfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:36:13 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/42, 0x2a) [ 907.692511] audit: type=1326 audit(1617957372.968:3467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17385 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:13 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:36:13 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/snmp\x00') 08:36:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)) 08:36:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2302"], 0x3e) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:36:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b6}]}) sysinfo(&(0x7f00000001c0)=""/217) 08:36:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x1c, 0x3, 0x1, 0x301, 0x0, 0x0, {0xf}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 08:36:13 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000200)=""/25) [ 908.020870] audit: type=1326 audit(1617957373.298:3468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17410 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 908.515011] audit: type=1326 audit(1617957373.788:3469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17385 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 08:36:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2302"], 0x3e) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:36:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) removexattr(0x0, 0x0) 08:36:13 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) timer_gettime(0x0, 0x0) 08:36:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x190, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 908.626819] audit: type=1326 audit(1617957373.898:3470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17421 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 908.680559] audit: type=1326 audit(1617957373.958:3471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17419 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x5000aea5, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000100000000001cf91ef5e9a3ff000000000091e09052d2b1"]) 08:36:14 executing program 1: pipe(&(0x7f0000000000)) fork() getresuid(&(0x7f00000052c0), &(0x7f0000005300), 0x0) [ 908.828144] audit: type=1326 audit(1617957374.098:3472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17423 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:14 executing program 5: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000000c0)="0f", 0x1}, {&(0x7f0000000180)='E', 0x1, 0x80000001}, {&(0x7f0000000240)='r', 0x1}], 0x0, 0x0) [ 908.923826] audit: type=1326 audit(1617957374.128:3473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17410 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:14 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="4fc22a705110d094d1520ff4824adf3d3f10035ba6a28e75080dbf1df8ef34deb52fcce7da990731d6e19b06ddb2d693a2d772c918fc269ae37d22ae171d7b9f639d2d9ef3503a8431930ad32c1238c55ea52b2ca0def4e6c7c6a879035a4c9020cc916c9c617cd9b4df7f8ff41c63a3b6c1f07b114af67af09aede0895cf0f8b264dfe72838c8543c73e29bb9fe2aedeb25707d45f5ee000000000000000018222a9e2ec5875c53bce2b27cba61dac70c1e7850af4f0da9b9fe789f6e1ad04ab4789625ab02d51e2ef9d4e9e5b6a01810d0bda3c826b26c1752e5554c0008ab18330fc2cafaf47720e5f13386f5bed4556c9ba78dcbb0929f2aa3ab0e8d862e4b41fb8be27c004ac2cd27489354ab906b8e00af57abc3909b1db3a11969de89a8f14ae9a11508d58e0c20553fe2b6221e07616398b0ac912397b8bb0a20ffa493d3a8f799244108d6e802e76dafb34793a3784f33f0abdd2b8e99faff99f946ae1876f5dce3ba080a3703fcfbdcfdbb49af59ff1996e304a080a622b4a5f17fe75c300ef4d5", 0x186) r2 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x60002011}) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x500, 0x2e0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, 0x0, 0xc804) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota='usrjquota='}]}) 08:36:14 executing program 1: syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)=""/9, 0x9) 08:36:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000003bc0)='./file0\x00', 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000003d80)='SEG6\x00', 0xffffffffffffffff) 08:36:14 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{}, {0x77359400}}, 0x0) [ 909.455861] audit: type=1326 audit(1617957374.728:3474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17421 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000003ac0)='./file0\x00', 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000003b00)='trusted.overlay.upper\x00', &(0x7f0000003b40)={0x0, 0xfb, 0x39, 0x0, 0x0, "481d5fbe7f499c966fe221a745503220", "463ce8c028d07b4c88edc06448ad6349bc3de756048e5d4e718c5ca616cddced90842158"}, 0x39, 0x1) 08:36:14 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000009c0)='net/tcp\x00') r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x24, 0x0) 08:36:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x191, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:14 executing program 1: r0 = msgget(0x2, 0x0) msgctl$IPC_RMID(0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="3d00005f0b01dc347e14e2d8bdf63060a431e7fef644d8367bef4dbd526bbd0510adaeacf37b8db4255b4b920fb528205505cb843fb745a9dd7d896a78932ae20dfc17705d1fd6f62183c13dc88787964dc614d60f6adf1413c199d4d44df580c699562f783817aaefdfa9bd7506a14f576fdfa77beaed497b9d664e801155673ca03bcc1a8a2282170c99ac18bd319dca6f2dd14eef2f32d3aed41c1672e05ff2b63855678d40d7664d94", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643def293d79c02b4b336b4786372ddd87f55f412b26f4f9980e56de73", @ANYRESDEC=0x0, @ANYBLOB="2c67722f75705f69643d996b115d18eaa0ddd7566bec4204bd6ff75df9e42f4a07479adac06a2d2d117c05965166f81f847566b8fe4b12437ae5069abce3a0d7c997eaf7", @ANYRESDEC=0x0]) msgsnd(r0, &(0x7f0000000440)={0x1}, 0x8, 0x800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) accept4$unix(r2, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x0) 08:36:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000080)="47c5ccc32ab405af3fab", 0xa, 0x5}, {0x0, 0x0, 0x7ff}], 0x8000, &(0x7f0000000100)) 08:36:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000940)=[{0x4000000000000, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="187568000000000017"], 0x140}], 0x3, 0x0) 08:36:14 executing program 5: timerfd_create(0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x8}, 0x0, 0x0, 0x0, 0x0) [ 909.628806] audit: type=1326 audit(1617957374.908:3475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17462 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:15 executing program 2: getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) 08:36:15 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/79, 0x4f) symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') 08:36:15 executing program 0: syz_mount_image$nfs(&(0x7f0000000300)='nfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)) 08:36:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_delete(0x0) 08:36:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x192, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:15 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002300)='/dev/zero\x00', 0x0, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 08:36:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000180)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef11c4294d84fb1db9012eecf57f3bb0722db7a3e9edc12bb4f3ece7d1cb02a3fefa49d3adf9ed7c08cb330af6", 0x66, 0x400}], 0x0, &(0x7f0000000040)=ANY=[]) [ 909.990368] audit: type=1326 audit(1617957375.268:3476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17485 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000002480)={0x3}, 0x4) 08:36:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000001c0)={{}, 0x0, 0x0, @unused, @name="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"}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x5000aea5, &(0x7f0000000180)=ANY=[]) 08:36:15 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x1) 08:36:15 executing program 4: syz_mount_image$udf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) [ 910.454857] audit: type=1326 audit(1617957375.728:3477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17462 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 910.521204] audit: type=1326 audit(1617957375.798:3478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17504 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:15 executing program 5: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x5, &(0x7f0000001700)=[{&(0x7f0000000240)="5c270a5b2238ab5e4adc0dca2bf14294af91fa7a86740c6347fad547af9820643bfb190f10cf7b61ac4328f384ecb0236a396f662faf9bae5ca6e2feec85475562a069104f7575630d3ef235b0188b466d6c56784fb39c109a80435962d63155d1b0ee70ccdbb29c9b4720060c835e575b7e0dface78e515a3b3afb166f735a2c377b8096b083bfe6fb32d7e2752ccfca228992d5888d07fe0836a49a27e64ecdc321054df510984a1b0d44f2a99af1bd9137616c06fef", 0xb7}, {&(0x7f0000000300), 0x0, 0x8}, {&(0x7f0000000400)="cc8bc7640cc55b1cc341f716b48fd7c677b34033a7dd3b611a31160164165c96f03d8da538b3d66ddb4335e799ae538494e7085a83b0a4d2167d2aa7d8d67421ba9af13b0245f65afa9eb75a2de76fcde06335836466780aa48d7c", 0x5b}, {&(0x7f0000000480)="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", 0x8b4, 0x41b3b747}, {0x0, 0x0, 0x80000000}], 0x1, &(0x7f0000001800)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 08:36:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x193, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:15 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000e80)={0x1, &(0x7f0000000e40)=[{0x6, 0x0, 0x0, 0x2a4}]}) 08:36:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 08:36:16 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0x20000051) 08:36:16 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) pipe2(&(0x7f0000000380), 0x0) 08:36:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x1000, 0xfffffff9, 0x2, "4854383fa114e89f591bc213c9392319eb4854"}) 08:36:16 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000080)="c3", 0x1}], 0x0, 0x0) 08:36:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x194, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:16 executing program 5: timer_create(0x3, 0x0, &(0x7f0000000080)) 08:36:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000180)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef11c4294d84fb1db9012eecf57f3bb0722db7a3e9edc12bb4f3ece7d1cb02a3fefa49d3adf9ed7c", 0x61, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='usrjquota=']) 08:36:16 executing program 4: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 08:36:16 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)={{0x3f}}) 08:36:16 executing program 5: syz_mount_image$nfs(&(0x7f0000000300)='nfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x2000004, &(0x7f0000001540)={[{'0000:00:10.0\x00'}, {}]}) 08:36:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x195, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1404"], 0x14}}, 0x0) 08:36:17 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x3938700}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000380)) 08:36:17 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 08:36:19 executing program 1: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000014c0)=[{&(0x7f00000003c0)="d6", 0x1}, {&(0x7f00000004c0)="ec", 0x1}], 0x0, 0x0) 08:36:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@usrjquota='usrjquota='}]}) 08:36:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x196, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:19 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)) 08:36:19 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/138) 08:36:19 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 08:36:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000021c0)={0x0, 0xd3, 0x2}) 08:36:19 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000980)='/dev/uinput\x00', 0x802, 0x0) [ 913.956037] kauditd_printk_skb: 4 callbacks suppressed [ 913.956051] audit: type=1326 audit(1617957379.228:3483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17572 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:19 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)) 08:36:19 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 08:36:19 executing program 1: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4) 08:36:19 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'iso8859-7'}}, {@map_acorn='map=acorn'}, {@unhide='unhide'}, {@dmode={'dmode'}}]}) 08:36:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) r0 = fork() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x80000001}) 08:36:19 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) creat(&(0x7f0000000040)='./bus\x00', 0x0) statfs(&(0x7f0000000480)='./bus\x00', &(0x7f00000004c0)=""/235) 08:36:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x197, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:19 executing program 5: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/169, 0xa9) [ 914.215654] audit: type=1326 audit(1617957379.488:3484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17597 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 914.245563] audit: type=1326 audit(1617957379.518:3485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17598 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:20 executing program 2: io_setup(0x800, &(0x7f0000000100)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x4, 0x0, r1, 0x0}]) 08:36:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 08:36:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180)='nl802154\x00', r0) 08:36:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x198, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 914.783130] audit: type=1326 audit(1617957380.058:3486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17572 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:20 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:36:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='usrjquota=']) 08:36:20 executing program 4: syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x2807848, &(0x7f0000000000)) 08:36:20 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 08:36:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f00000001c0)=0x80) [ 915.048839] audit: type=1326 audit(1617957380.328:3487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17597 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 915.072392] audit: type=1326 audit(1617957380.348:3488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17598 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/rt6_stats\x00') 08:36:20 executing program 5: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x1, 0xee01, 0xffffffffffffffff, 0xee01}}) 08:36:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b8}]}) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 08:36:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x199, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x3938700}) 08:36:20 executing program 0: syz_mount_image$nfs(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:36:20 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) 08:36:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffc8b4}]}) rt_sigqueueinfo(0x0, 0x0, 0x0) [ 915.194376] audit: type=1326 audit(1617957380.468:3489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17639 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:20 executing program 0: getgroups(0x1, &(0x7f0000000140)=[0xee00]) 08:36:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 915.285860] audit: type=1326 audit(1617957380.558:3490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17647 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:21 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0)='batadv\x00', 0xffffffffffffffff) 08:36:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$udf(&(0x7f0000000140)='udf\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@longad='longad'}]}) 08:36:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8935, 0x0) 08:36:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19b, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x44}}, 0x0) 08:36:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000100)={'wlan0\x00', @ifru_ivalue}) 08:36:21 executing program 2: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 08:36:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setrlimit(0x4, &(0x7f0000000200)={0x1f, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) sched_setattr(0x0, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000001c0)='./file0\x00', 0x3fd, 0x0) tkill(0x0, 0x17) 08:36:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19c, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 916.015410] audit: type=1326 audit(1617957381.288:3491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17639 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 [ 916.110972] audit: type=1326 audit(1617957381.388:3492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17647 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466459 code=0xffff0000 08:36:21 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f00000002c0)={'wlan1\x00', @ifru_flags}) 08:36:21 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) fork() r0 = getpid() process_vm_readv(r0, &(0x7f0000002580)=[{&(0x7f0000000000)=""/231, 0xe7}, {&(0x7f0000000100)=""/87, 0x57}, {0x0}, {&(0x7f0000001240)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003b80)=[{&(0x7f0000002640)=""/165, 0xa5}, {&(0x7f0000002700)=""/108, 0x6c}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/205, 0xcd}, {&(0x7f0000003880)=""/231, 0xe7}], 0x5, 0x0) 08:36:21 executing program 2: rt_sigprocmask(0x2, &(0x7f0000000000)={[0x40]}, 0x0, 0x8) 08:36:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00', r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={0x0}}, 0x0) 08:36:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="c4000000170a010800000000000000000c0000040c00054000000000000000010900010073797a31000000000c00054000f5000000000004090002"], 0xc4}}, 0x0) 08:36:21 executing program 2: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) 08:36:21 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000502d25a80648c63940d1124fc6040080f400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) 08:36:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xcd) 08:36:21 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 916.675342] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.5'. 08:36:22 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x452802, 0x0) 08:36:22 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x18}, 0x10) 08:36:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19d, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:22 executing program 0: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0)='batadv\x00', 0xffffffffffffffff) 08:36:22 executing program 1: process_vm_readv(0x0, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 08:36:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000008380)={0x0, 0x0, &(0x7f0000008340)={&(0x7f0000000180)=@delchain={0x1fc0, 0x65, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x1f8c, 0x2, [@TCA_U32_SEL={0x314, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}}, @TCA_U32_ACT={0x1c74, 0x7, [@m_pedit={0x1c70, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1c44, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}, @TCA_PEDIT_PARMS_EX={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}}, @TCA_CHAIN={0x8}]}, 0x1fc0}}, 0x0) 08:36:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_flags}) 08:36:22 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'ip_vti0\x00', @ifru_flags}) 08:36:22 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x3, 0x0) 08:36:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="c4000000172501"], 0xc4}}, 0x0) 08:36:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x3, &(0x7f0000000480)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:22 executing program 1: pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000001080), 0x0) 08:36:22 executing program 4: rt_sigprocmask(0x2, &(0x7f0000000000)={[0x40]}, &(0x7f0000000080), 0x8) 08:36:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) 08:36:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19e, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xfffffffffffffffe}}, 0x0) 08:36:22 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, 0x0) 08:36:22 executing program 2: openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) fork() ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 08:36:22 executing program 0: r0 = getpid() ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 08:36:22 executing program 1: syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x10843) 08:36:22 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 08:36:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x890b, 0x0) 08:36:22 executing program 2: set_mempolicy(0x0, &(0x7f0000000000), 0x6) 08:36:22 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0)='batadv\x00', r0) 08:36:22 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000002440)={'lo\x00', @ifru_mtu}) 08:36:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000008380)={0x0, 0x0, &(0x7f0000008340)={&(0x7f0000000180)=@delchain={0x2000, 0x65, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x1fc4, 0x2, [@TCA_U32_SEL={0x314, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}}, @TCA_U32_DIVISOR={0x8}, @TCA_U32_ACT={0x30, 0x7, [@m_ipt={0x2c, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}, @TCA_U32_ACT={0x1c74, 0x7, [@m_pedit={0x1c70, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1c44, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}, @TCA_PEDIT_PARMS_EX={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}}, @TCA_RATE={0x6}, @TCA_CHAIN={0x8}]}, 0x2000}}, 0x0) 08:36:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x19f, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:22 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000a00)='ns/cgroup\x00') 08:36:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_flags}) 08:36:22 executing program 2: sched_setparam(0x0, &(0x7f0000000a40)=0x7ff) 08:36:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="c4000000170a010b00000000000000000c0000040c0005400000000000000001090001"], 0xc4}}, 0x0) 08:36:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001340)) [ 917.582682] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.1'. 08:36:22 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) accept$packet(r0, 0x0, 0x0) 08:36:22 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) fork() r0 = getpid() process_vm_readv(r0, &(0x7f0000002580)=[{&(0x7f0000000000)=""/231, 0xe7}, {0x0}, {&(0x7f0000000240)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003b80)=[{&(0x7f0000002640)=""/165, 0xa5}, {0x0}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x3, 0x0) 08:36:22 executing program 1: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000bc0)='batadv\x00', r0) 08:36:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:23 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000000)={'syzkaller1\x00', @ifru_hwaddr=@multicast}) 08:36:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a0, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="c400000010"], 0xc4}}, 0x0) 08:36:23 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) fork() r0 = getpid() process_vm_readv(r0, &(0x7f0000002580)=[{&(0x7f0000000000)=""/231, 0xe7}, {0x0}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003b80)=[{&(0x7f0000002640)=""/165, 0xa5}, {&(0x7f0000002700)=""/108, 0x6c}, {&(0x7f0000002780)=""/4096, 0x1000}], 0x3, 0x0) 08:36:23 executing program 0: syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) 08:36:23 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r1}, 0x40) 08:36:23 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x89a0, 0x0) 08:36:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000000)={'veth1\x00', @ifru_addrs=@nfc}) 08:36:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1b6) [ 918.080827] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. 08:36:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000200)={'rose0\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}) 08:36:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) 08:36:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=@framed={{}, [@btf_id]}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00', 0xffffffffffffffff) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000a00)='ns/cgroup\x00') fork() ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 08:36:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 08:36:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7abc291a, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x12}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x44, &(0x7f0000000080)=""/68, 0x40f00, 0x4, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x0, 0x40, 0x1000}, 0x10, 0xffffffffffffffff}, 0x78) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00', 0xffffffffffffffff) 08:36:23 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0x1c, 0x0, 0x0) 08:36:23 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}}}}) 08:36:23 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) 08:36:23 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 08:36:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00', 0xffffffffffffffff) 08:36:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 08:36:23 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], &(0x7f00000000c0)=""/207, 0xb4, 0xcf, 0x1}, 0x20) 08:36:23 executing program 5: unshare(0x480) accept(0xffffffffffffffff, 0x0, 0x0) 08:36:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe90, 0x4, 0x0, 0x1, [{0x2b0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85ec"}, @NL80211_PKTPAT_PATTERN={0x11, 0x2, "e177e2972177e5a8b7fd35326c"}, @NL80211_PKTPAT_PATTERN={0x31, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a4370f847d62"}, @NL80211_PKTPAT_PATTERN={0xf9, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b2ad81f9a"}, @NL80211_PKTPAT_PATTERN={0xdd, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a3e8e550ce3960cb9ee6500f5f0836c1603be5c1ab176b06573e58ab6b7739b9b"}]}, {0x100, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x5dab}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ffd08bb95ba972fa78ab6d19e955389d861fcad047ac35aa58e8fd8f4884713af3f4d1076b5a9dba6137a711"}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x2d, 0x1, "dd221a29ff28576303519343819633a12a51e338621706190399004c902a05ccd4fe5fb24b7c791368"}]}, {0xaa0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x75, 0x2, "5aa639de20faa609c8a406ab7c908fa96f8adabe051a677322a76738e2582c6999c5e7e7d79d137a2c00081fd0272b7ed6e803611291ee4784177652e255ff2da5f0450c41c10bbbef18db953a1bbaff3f438d68afa56cb1c585fc0a43a862fa533e647e276e1a71b99438f140d10bbd82"}, @NL80211_PKTPAT_PATTERN={0xa5, 0x2, "af1b600794a3bf0602cab73da9d6b78db56c48541847f77c87f0ee4e82ee9431a5f7bf2057d2339745b48dde3b4cdb2b6c154472155d08b8d376318faee3096d7c76640dc01d72bdd17348b9cc37d60090f156ab649618da9c6576adb5989afb102766a89d09f6d9b4c507ccfbe2fe39bcd7948018f77dbf12f831b2dc2f13e10a6c5bcf5914a420d1119cd51f23fcee47f92a5bdc8f355ba5e08d84a111a83c58"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x969, 0x1, "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"}, @NL80211_PKTPAT_OFFSET={0x8}]}]}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:36:23 executing program 1: bpf$PROG_LOAD(0x23, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x887, 0x1}, 0x40) 08:36:23 executing program 4: socketpair(0x2b, 0x0, 0x1, &(0x7f0000007fc0)) 08:36:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)) 08:36:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x43, 0x0, 0x0, @private0, @local}}) 08:36:23 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) 08:36:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @dev}, @qipcrtr, @l2}) 08:36:24 executing program 2: r0 = socket(0x2, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}}) 08:36:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00', r0) 08:36:24 executing program 0: pipe(&(0x7f0000000400)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 08:36:24 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$alg(r0, 0x0, 0x0, 0x0) 08:36:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a3, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0), 0x10}, 0x78) 08:36:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_SOCKETS={0x4}]}, 0x24}}, 0x0) 08:36:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 08:36:24 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000019680)={&(0x7f0000019640)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000019840)={&(0x7f0000019800)='./file0\x00'}, 0x10) 08:36:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'syztnl2\x00', 0x0}) 08:36:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0, 0x60}}, 0x0) 08:36:24 executing program 0: socket$inet6(0xa, 0x0, 0x10000) 08:36:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}]}, 0x28}}, 0x0) 08:36:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x49}}}}}, 0x30}}, 0x0) 08:36:24 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:36:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) accept(r0, 0x0, 0x0) 08:36:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x300}, 0x0) 08:36:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000019880)={0x0, 0x3, &(0x7f00000196c0)=@framed, &(0x7f0000019700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:24 executing program 4: setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 08:36:24 executing program 1: socketpair(0x29, 0x2, 0x0, &(0x7f00000019c0)) 08:36:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a4, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:24 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000280)) 08:36:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1955, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 08:36:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x3, &(0x7f0000000740)=@framed, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0xb4, 0x0, 0x1}, 0x20) 08:36:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', 0x0}) 08:36:24 executing program 2: bpf$PROG_LOAD(0x1a, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000006c0), &(0x7f0000000700)=0x4) 08:36:24 executing program 4: socketpair(0x0, 0x2, 0x9f9, &(0x7f0000006240)) 08:36:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xb, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1}, 0x8, 0x10, 0x0}, 0x78) 08:36:24 executing program 2: unshare(0x50000) 08:36:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 08:36:25 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000200)='nl802154\x00', 0xffffffffffffffff) 08:36:25 executing program 5: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 08:36:25 executing program 4: pipe(&(0x7f0000001740)={0xffffffffffffffff}) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 08:36:25 executing program 2: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xfffffffffffeffff) 08:36:25 executing program 2: socketpair(0x2, 0x5, 0xe1, &(0x7f0000000000)) 08:36:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x3, &(0x7f0000000740)=@framed, &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0), 0x10}, 0x78) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000980), 0xc, 0x0}, 0x20000000) 08:36:25 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0xfffffffb}, 0x8) 08:36:25 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000019680)={0x0, 0x0, 0x8}, 0x10) [ 919.944620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x44, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sshd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev}]}, 0x44}}, 0x0) [ 920.006089] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:36:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="d40000009e30df"], 0xd4}}, 0x0) 08:36:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a6, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x500}, @NBD_ATTR_SOCKETS={0x4}]}, 0x30}}, 0x0) 08:36:25 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="e80000000201010800000000000075d50d6200000c0019"], 0xe8}}, 0x0) 08:36:25 executing program 2: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, 0x0, 0x0) 08:36:25 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 08:36:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000500)='batadv\x00', r0) [ 920.191196] netlink: 200 bytes leftover after parsing attributes in process `syz-executor.5'. 08:36:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@call], &(0x7f00000000c0)='GPL\x00', 0x4, 0x92, &(0x7f0000000100)=""/146, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x6, &(0x7f00000008c0)=@framed={{}, [@alu={0x4}, @map_val]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:25 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') 08:36:25 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) 08:36:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe8c, 0x4, 0x0, 0x1, [{0x2b0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85ec"}, @NL80211_PKTPAT_PATTERN={0x11, 0x2, "e177e2972177e5a8b7fd35326c"}, @NL80211_PKTPAT_PATTERN={0x31, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a4370f847d62"}, @NL80211_PKTPAT_PATTERN={0xf9, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b2ad81f9a"}, @NL80211_PKTPAT_PATTERN={0xdd, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a3e8e550ce3960cb9ee6500f5f0836c1603be5c1ab176b06573e58ab6b7739b9b"}]}, {0xfc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xd6, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ffd08bb95ba972fa78ab6d19e955389d861fcad047ac35aa58e8fd8f4884713af3f4d1076b5a9dba61"}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x2d, 0x1, "dd221a29ff28576303519343819633a12a51e338621706190399004c902a05ccd4fe5fb24b7c791368"}]}, {0xa98, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x49, 0x2, "5aa639de20faa609c8a406ab7c908fa96f8adabe051a677322a76738e2582c6999c5e7e7d79d137a2c00081fd0272b7ed6e803611291ee4784177652e255ff2da5f0450c41"}, @NL80211_PKTPAT_PATTERN={0x3d, 0x2, "af1b600794a3bf0602cab73da9d6b78db56c48541847f77c87f0ee4e82ee9431a5f7bf2057d2339745b48dde3b4cdb2b6c154472155d08b8d3"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x9ec, 0x1, "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"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x4}, {0x4}]}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:36:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:25 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80) 08:36:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x4}]}, 0x24}}, 0x0) 08:36:25 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000180)) 08:36:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @fib={{0x8, 0x1, 'fib\x00'}, @void}}]}], {0x14, 0x10}}, 0x90}}, 0x0) 08:36:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0, 0x60}, 0x1, 0x0, 0xffffff7f}, 0x0) 08:36:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 08:36:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000000)={'syzkaller1\x00', @ifru_mtu}) 08:36:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0}}, 0x0) 08:36:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 08:36:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[], 0x114}}, 0x0) 08:36:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a8, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000002180)="717a68f54f3beb8e5de86ad39ceb6c6a", 0x10) 08:36:26 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00', r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x6c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sshd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}]}, 0x6c}}, 0x0) 08:36:26 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240), 0x8) 08:36:26 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000002cc0)) 08:36:26 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x6, 0x7, 0x0, 0x0) 08:36:26 executing program 2: setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 08:36:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x3, &(0x7f0000000740)=@framed, &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x60}}, 0x0) 08:36:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:36:26 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/time_for_children\x00') 08:36:26 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00', 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x50, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sshd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x50}}, 0x800) 08:36:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1a9, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f0000000940)=@framed, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:26 executing program 1: read$alg(0xffffffffffffffff, 0x0, 0x0) 08:36:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xb, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:26 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f0000000040)={'team0\x00'}) 08:36:26 executing program 2: pipe(&(0x7f0000001ec0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 08:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000004a40), 0x4) 08:36:26 executing program 2: syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 08:36:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1ea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1e8c, 0x4, 0x0, 0x1, [{0x290, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85ec"}, @NL80211_PKTPAT_PATTERN={0x11, 0x2, "e177e2972177e5a8b7fd35326c"}, @NL80211_PKTPAT_PATTERN={0x31, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a4370f847d62"}, @NL80211_PKTPAT_PATTERN={0xf9, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b2ad81f9a"}, @NL80211_PKTPAT_PATTERN={0xbd, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a"}]}, {0xf8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ffd08bb95ba972fa78ab6d19e955389d861fcad047ac35aa58e8fd8f4884713af3f4d1076b5a9dba6137a711"}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x25, 0x1, "dd221a29ff28576303519343819633a12a51e338621706190399004c902a05ccd4"}]}, {0xff0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x3d, 0x2, "5aa639de20faa609c8a406ab7c908fa96f8adabe051a677322a76738e2582c6999c5e7e7d79d137a2c00081fd0272b7ed6e803611291ee4784"}, @NL80211_PKTPAT_PATTERN={0xa1, 0x2, "af1b600794a3bf0602cab73da9d6b78db56c48541847f77c87f0ee4e82ee9431a5f7bf2057d2339745b48dde3b4cdb2b6c154472155d08b8d376318faee3096d7c76640dc01d72bdd17348b9cc37d60090f156ab649618da9c6576adb5989afb102766a89d09f6d9b4c507ccfbe2fe39bcd7948018f77dbf12f831b2dc2f13e10a6c5bcf5914a420d1119cd51f23fcee47f92a5bdc8f355ba5e08d84a1"}, @NL80211_PKTPAT_MASK={0xef1, 0x1, "f44178e46273e9ed4e4abde43caac44df5faccf4569e3110854344d4bb4ae27e73de90cc0edf829e64c3dd9e916ad5ee815b79b9a9417088d3691e939fadbfadfcac0bd63e33064d817b22c6b823e9af0f53efb29020f54f40156371a8972a8a1980244c69fc6f9f0b2340669418f538cd04352dc2af64472d3e5579ba132b3259846fa7831f0d3ce9bbb6c1eb5cd5541c18b9ad8fb0597d59e75a378b9536e3ca46adf9f7aa8321b6e213c9b70943744a9fb6397ae4d98dbc472bea0ab3253a645f08f42f09b86317194ea526e21101725f6acf3935459f0d521f860943c428aef3a35b4542f1ee5debaeab1ffd96e25f04807e396b38ea12a75086e1bc9c24dc9a22bfa596ad72e5d76400844c480494f84326141aeb11d0115bdc1ec36fdd6b598b4f5ef62d1dfc0bf21abcc3ba357306bdd8af6397eef41c21a5b9b1857c0ecc44aa1bdb818688a3f5d8ee4820ba25a71a24c0946ca3d4a046f20d64589307f8517efa1491304235e66bdc0335e5eb502836403b2f01247ff2a3fa85bb6e4faf011a8fec8d8761563d7ed11e177cc69d0505db254a5e20221ecdc704606f5468a8e4b25b8458dd0c33d6b09efd52943025f3b222190b9310894ca7d703e97e1344bce4f77568362bd106a80fcd8cae8707702c1261e5cdb0df368cfe7f247b9e6072ee095d711ee33b23e71cd5b26f330b19ae2897f11b03dbf4b761bea29e4e1d5b147486f3ea52ebddef906208d5a2201fcae83f106d3815c87eacbb62754d8c7b1754ebf7cf53ef438f1e9797fd1b74ec56f399ec24ffd5aa57669a72c22872052cc7ab8f6a7c0c10f33c9f1aad730c653ea709f5cf8c618813745f14fc9d8c7c97a981baee9185829dd1b14e8ed3eca71d2b2517748609a2b5be81a8c47c1d3615c3da94c5011d840ecf743dcac869ab5cff7561f080e9dc2b91cb1429d1744439e172ccda42e8d6f1b0b370c3441a3904a8abc56d407ddb6edb2817d3b97d8eef21c2252fd4761e659d10d0eeb340066c493fa2a68ca58c1ad44227111d2e8a8f3a4e4ba08372ca9262529c3c344cef234886b759781ac6b81e009ff81d2d02c332494dd32ecc92fdfbd5094154889840ed01433a153cf59014cbc668de964f28834c562abcde3bab90ad2dc2e01dc5b15df4f949efdaf9875446468ba076ba2e47e1f6d7d3aaf5a8ee49f97742a7ac7065b1bd36ba03eecc90607cb5d033b1fbeb1aefcc348ce5d55c79f30c3fc3a09682bb52cc4a6ea3460caf1da719224b9e4a49222266a1c56670f3f4ae8155cc9aadb1ceb0e7a7d735934c83090f738586de85fd05e659d8244c4bf0bb43f534d8a584466d2034f63b4a44bb6814c2154e95d8eefa54ab5adea3c01468fbefbdca1f23e6a4227871a3200b5f80efcecff3fad0a1f9e40a77aa315108c5172309afda986e6dbe5139cef2d1a704e518fe4ba8a063c38c4ecb65b67094d01d10df25dd3edc5e5d7b746a01e4531c86116d90b556386f0c1ce5045da1794e6f4ec3628968190709f26b392bb428cc22530bce0fce12dc8412c1165c07b57a97b924e2c539fcf9b3c762566691e748949ebb21f7589c0f2197f27e2e98361ed5effd9a3afc8828e1fd0b9191bfee4098badbf582798aa6bb8efec1dea3ac381c06793e37366d21f811f92c00e2b61d21868294453c1b4bbdf79b13d5aef9f61674b12d90d3558a666f6d4d8360488e48bf8dde5a6073d8f2a2d1c8ed98d28f55bcdf4074ac4c7504f66118604b849185320580a4b3e9e8c2a68641185ed628ea9b2bcf685bc121e3c1360875467ad9395b5ceb21a672b0569542ea826294ec1f1f1da6f76d0da34168bda68dcd434e4dacff01e7026db1d57be0117ad2d3075c8d7eb6cf58fdc4149836b94685b2977cf9defdb0d4099c79d385cd8cc7f15d1812765455c6278af74bcbdf16fb00d2a7997d572c130c2bc646c55d2c6fd33cd02ddea8223a93b14c1728064af50014b4251780e7912644071da89b3ebe82ce5d5e6c38e97bc37980b5155307252f4dafd634c11f2e0e40ccedb9e875fa59f9c4cef7e7460372d64eabc32b745163ca29c8709d477f9f89164c44c9c6766c8751e9561099ad2cbd4795e8de770a40ecb2a05a298996cfb316ca5dd10c55fa06e651cdb2327264d09099db1a8d9c68e59c6f2109556660a87bbbe682546602bdcf6e340270681392e54dd08d2e3ecba9ae346db27fe568624f9b476167a2353f3e0b761f24cea78f29461f011dda53c3d62c8079877052e1cf8b43680a4e4ac9ba86a8b8951e41c8eeb3a2789f34cbd776175d1ef4b989b4d9c2b08150abcc1ee387bf5b9508716aa63ab1c742808c594e3dbd94fe5ba99fcd311b85a7c44370627787a1e900992f367256d350678ba522692d7b07fc58488c41cb715abd9fc607d3b9fafa1c28c1082e4420795d43ee977fefee40e213946e402af2c4ab6f39ba2762ab99cfa7818722ded588b4b705422dded88a2453e84b4556c78224435cf22bdf9160f7b8c7c510f65eb3c3721c8d68e612ee4dbd21c72badb0c886937e594d9cb1ddabf0c717e8086ae29cf44a7d5d4d8e62e3410535b715bd2601cd20658e75e25fcc5a6d58b0b4a7adec33bb71438c1ad20eb76936af873860f3033d5e02fbe9d5499235a30594b8ae842884251772ca5e08cf985d309d25db3320ebf693be548c025dca1c96693e4e94f91acae388a75e02ba47e6874c2b991588e9e6cdf48cecfc20be3804ea610b5a5cc06940743876f39d1203bb40e39a42c4a3b798be82412f864f935721e26d5a904760842be50e0747ee08ce8c71904c9a141b76281229d4935fab964775e8c5bf235ed2a8493cc013ae9e2fbe1d940a831563ae66c8544e9ed39d61985decb171f23327edffc06e3785b57ef86b580dbc37ea84502c1661240ccd8b5722022b51bc46caebe4317d3507145cb2cee14f234633d36de63c8fa1889a1e958dc866ee7fc1c0b7fe792f807137b581c0fda7f3190d3ef5be8d37de470312ca14d4c8d99fac7f0b514f36f10df18987e81eb042f7f35919e233729bb4e52ebecc63a6dccf2064463d3af564ac6563f7d1e084d337254002ad760592e38d05896906ecd85f1567477cfc3edeef4a7b6cf5b05523164712f90a57b8bb8bc5a533df18661a3aba15b7b23ccbe3601144d8728d3a7973ce1fe0c0ee8071ee29b995cef11ca6e851d80a266dd3736190c61cee392c35229be673914ad5ef4a21f5020f841fafa57f91296dc4ac962a1569d3f31a8b7878c6ec22e71be83040b4fa9f71c89bfb54b6da73910e29f5924cf77e1bcd71640be4a97585b4d8febc2af2323a839855667312acf70a8f77edcdf0e517b20cc3e1aba15218f631f745822d1435846fc48082f351e30c4a58a673b0c3929b684732ed4931e9fc3ffe08f6f9f36a8513fabf5540e87bc67477d06bfbebe4cd31c6425d9547a60a9562bd5c190ba4be1440447ab25bd5bb2d6fc993153eea5d0929366111501cc58f7481f4de331a7ad8da492eb9dd5812265019bc63cb0e12395210ce786944b5999600f77b8227068654435657c73ec3a8c7587675e52fe479058cb64664f7238d92ab657b28274995ec9e63101fe984e8e8f30561d89d5249c3673e3d146b9d4bfb2a81374b414eaad3d8fdf1d130ee63d7390e406b2fbe62b016cadeed9d65a289a128936c66e18d95c3dd8cf3b245c7879debe810c64507aeb914dada0045a863154e664ed1c924fef70898a012872db6acc47a986c4240a6af04d220674430572631cad3c5beec258dfdd82d626631471265a8c8d4baa9592e93c227240b67fd12ef0189b44bbbb188021594c0d58a079973deda084cb12e4d837070e80c9a7572db5d2913b236a9d6b66d62a053b79d650a7cc752cbbcd0cda3479b10caaedb35477b2f2eb5ef08727514b6a43a1a45fc64ee4c63acd9be7a8459043d44558b555e00dfec1bbcd81bf3fdc26136017ddc27d271d97c6dac33b15c1a76a24074ae993941f1046c847e7cf6f0503680ab0d6e5aa9d87bc71ea1f8ddb2bfb0605200f2a40f5c4b644b02eed5055a70d9041a684482a69316b031aa501e3d883512a992eef895e6f5ac2d4a3e489faddcd3797f2259695d419cc5e32b80bcfab76e6ba663eb61083d955d8a78632f913ac2a41db0e6a13623f70937725ee13b65ed710597e34b6d0f0fcd403fba31b48354cb03d4193bc00f9d5c29542d8af2ccd089c687135e781131b040d4537d336540e8239eefc57bfa69961fe7565ee051bf935ffde74c65c67b250d8bc36285417e4730335ffc5f7c316607bdbac0399cd8a2156f930a77ec1e392cdf2fc06ab31f1e6a9cea3df545f33a2c441988f0aa8271bb5aecebb256b6daed8eb42d9df25930126448542a567c52f6e63aa6e9cd81a288f182b05fd00a75f9bf1c756778b9c876d8d3f3d651f0014853cc29e802856a96916ccb3c7fb51341c93aa3257029180b6b8b4adeaa5deb6a5eaae5eaa80755b0ca63a81430199ab7b55b6f1fd2f17dab1192aac3b8545f3c7715c8d21adbea388a17c72ecce6d5952a24a4a9c302d859155e29521bc824a71b4000da1798a33151a5e25fbf06a5f5c966b4b8a97994035ff4569f1fc03682603c98ad8a8c72b3f663aeb1a088666f4d4abc902764253c27d2a1f5bff40ee834b0cec982546d48b9e8abb81004347b9b7d8f4b40364c80f078e0bca539a1a99dc83c5adf26fa7c94b09d739e1baaa78fe46d3f8e0f8dee82adb8a782245922899f7fdb7828a1ac4193fd4333c8f266ad8a74c02fc9e591d5542e891e4a8fcffdfc60cbf3cd17c956c4efb0af6ce4fe0bb4022a65dfac3c076ae838e9b366705b3fdde4991fc2514c5c90b66328d9e15baee16696b675af5aa3df6f32d2117869740ccf72d2e322ba6ede0e0eba423442d286a1d635432fba31aadedefd9126b467acd9bb6c95c752ab451fff491363efbaeddcad9118c58bbb0323fc84ead17585616c26141ff8efc0fd94347d4baee58fced36f2eaa229a989ad1a9a9bfd8cd2f85227d9869bc20733fb1048c354ea36664511e4d574261f5a8bb556d2d88a8256f5c1bc9fdd3934ff0f2ed567a75fd1afba29ac849996b592b97dc353b92fdeec5beff216f8bd5ce137e23a831e5e5eb24c05abf59d40c3ef3797599d0af216ec41199d1de5425e0cc1ba857766ffebe6714ea1237b3b393b934a4e999281893a5acadd79a0729f21c3fefc3a0f52588dccf3dca31269aa087e633b51ec01b0198aee7383f67310a03af7aa7cbd195dedc85883a49bcf5ad442fff100396016bba882641cbd59b866d2a94f23e5a60588d1d02d47700539c8aef7ceab4710dd4a495e30242e22933cf333d963c9f2de4a5335da4bf318b9984"}, @NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x4}]}, {0xab8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xaa2, 0x1, "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"}, @NL80211_PKTPAT_PATTERN={0xd, 0x2, "55c75fcfbb2c4fa999"}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}]}]}]}]}, 0x1ec4}}, 0x0) 08:36:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x4, &(0x7f0000000740)=@framed={{}, [@generic]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4040801) 08:36:26 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000002a00)) 08:36:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1aa, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @local}}) 08:36:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000240)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x2c}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 08:36:26 executing program 0: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) 08:36:26 executing program 5: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c80)=0xffffffffffffffff, 0x4) 08:36:26 executing program 1: socketpair(0x2c, 0x3, 0x8, &(0x7f00000000c0)) 08:36:26 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 08:36:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) sendmmsg$inet6(r0, &(0x7f0000000500)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}}], 0x1, 0x0) 08:36:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe8c, 0x4, 0x0, 0x1, [{0x290, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85ec"}, @NL80211_PKTPAT_PATTERN={0x11, 0x2, "e177e2972177e5a8b7fd35326c"}, @NL80211_PKTPAT_PATTERN={0x31, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a4370f847d62"}, @NL80211_PKTPAT_PATTERN={0xf9, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b2ad81f9a"}, @NL80211_PKTPAT_PATTERN={0xbd, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a"}]}, {0xf8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ffd08bb95ba972fa78ab6d19e955389d861fcad047ac35aa58e8fd8f4884713af3f4d1076b5a9dba6137a711"}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x25, 0x1, "dd221a29ff28576303519343819633a12a51e338621706190399004c902a05ccd4"}]}, {0xacc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x3d, 0x2, "5aa639de20faa609c8a406ab7c908fa96f8adabe051a677322a76738e2582c6999c5e7e7d79d137a2c00081fd0272b7ed6e803611291ee4784"}, @NL80211_PKTPAT_PATTERN={0xa1, 0x2, "af1b600794a3bf0602cab73da9d6b78db56c48541847f77c87f0ee4e82ee9431a5f7bf2057d2339745b48dde3b4cdb2b6c154472155d08b8d376318faee3096d7c76640dc01d72bdd17348b9cc37d60090f156ab649618da9c6576adb5989afb102766a89d09f6d9b4c507ccfbe2fe39bcd7948018f77dbf12f831b2dc2f13e10a6c5bcf5914a420d1119cd51f23fcee47f92a5bdc8f355ba5e08d84a1"}, @NL80211_PKTPAT_MASK={0x9e1, 0x1, "f44178e46273e9ed4e4abde43caac44df5faccf4569e3110854344d4bb4ae27e73de90cc0edf829e64c3dd9e916ad5ee815b79b9a9417088d3691e939fadbfadfcac0bd63e33064d817b22c6b823e9af0f53efb29020f54f40156371a8972a8a1980244c69fc6f9f0b2340669418f538cd04352dc2af64472d3e5579ba132b3259846fa7831f0d3ce9bbb6c1eb5cd5541c18b9ad8fb0597d59e75a378b9536e3ca46adf9f7aa8321b6e213c9b70943744a9fb6397ae4d98dbc472bea0ab3253a645f08f42f09b86317194ea526e21101725f6acf3935459f0d521f860943c428aef3a35b4542f1ee5debaeab1ffd96e25f04807e396b38ea12a75086e1bc9c24dc9a22bfa596ad72e5d76400844c480494f84326141aeb11d0115bdc1ec36fdd6b598b4f5ef62d1dfc0bf21abcc3ba357306bdd8af6397eef41c21a5b9b1857c0ecc44aa1bdb818688a3f5d8ee4820ba25a71a24c0946ca3d4a046f20d64589307f8517efa1491304235e66bdc0335e5eb502836403b2f01247ff2a3fa85bb6e4faf011a8fec8d8761563d7ed11e177cc69d0505db254a5e20221ecdc704606f5468a8e4b25b8458dd0c33d6b09efd52943025f3b222190b9310894ca7d703e97e1344bce4f77568362bd106a80fcd8cae8707702c1261e5cdb0df368cfe7f247b9e6072ee095d711ee33b23e71cd5b26f330b19ae2897f11b03dbf4b761bea29e4e1d5b147486f3ea52ebddef906208d5a2201fcae83f106d3815c87eacbb62754d8c7b1754ebf7cf53ef438f1e9797fd1b74ec56f399ec24ffd5aa57669a72c22872052cc7ab8f6a7c0c10f33c9f1aad730c653ea709f5cf8c618813745f14fc9d8c7c97a981baee9185829dd1b14e8ed3eca71d2b2517748609a2b5be81a8c47c1d3615c3da94c5011d840ecf743dcac869ab5cff7561f080e9dc2b91cb1429d1744439e172ccda42e8d6f1b0b370c3441a3904a8abc56d407ddb6edb2817d3b97d8eef21c2252fd4761e659d10d0eeb340066c493fa2a68ca58c1ad44227111d2e8a8f3a4e4ba08372ca9262529c3c344cef234886b759781ac6b81e009ff81d2d02c332494dd32ecc92fdfbd5094154889840ed01433a153cf59014cbc668de964f28834c562abcde3bab90ad2dc2e01dc5b15df4f949efdaf9875446468ba076ba2e47e1f6d7d3aaf5a8ee49f97742a7ac7065b1bd36ba03eecc90607cb5d033b1fbeb1aefcc348ce5d55c79f30c3fc3a09682bb52cc4a6ea3460caf1da719224b9e4a49222266a1c56670f3f4ae8155cc9aadb1ceb0e7a7d735934c83090f738586de85fd05e659d8244c4bf0bb43f534d8a584466d2034f63b4a44bb6814c2154e95d8eefa54ab5adea3c01468fbefbdca1f23e6a4227871a3200b5f80efcecff3fad0a1f9e40a77aa315108c5172309afda986e6dbe5139cef2d1a704e518fe4ba8a063c38c4ecb65b67094d01d10df25dd3edc5e5d7b746a01e4531c86116d90b556386f0c1ce5045da1794e6f4ec3628968190709f26b392bb428cc22530bce0fce12dc8412c1165c07b57a97b924e2c539fcf9b3c762566691e748949ebb21f7589c0f2197f27e2e98361ed5effd9a3afc8828e1fd0b9191bfee4098badbf582798aa6bb8efec1dea3ac381c06793e37366d21f811f92c00e2b61d21868294453c1b4bbdf79b13d5aef9f61674b12d90d3558a666f6d4d8360488e48bf8dde5a6073d8f2a2d1c8ed98d28f55bcdf4074ac4c7504f66118604b849185320580a4b3e9e8c2a68641185ed628ea9b2bcf685bc121e3c1360875467ad9395b5ceb21a672b0569542ea826294ec1f1f1da6f76d0da34168bda68dcd434e4dacff01e7026db1d57be0117ad2d3075c8d7eb6cf58fdc4149836b94685b2977cf9defdb0d4099c79d385cd8cc7f15d1812765455c6278af74bcbdf16fb00d2a7997d572c130c2bc646c55d2c6fd33cd02ddea8223a93b14c1728064af50014b4251780e7912644071da89b3ebe82ce5d5e6c38e97bc37980b5155307252f4dafd634c11f2e0e40ccedb9e875fa59f9c4cef7e7460372d64eabc32b745163ca29c8709d477f9f89164c44c9c6766c8751e9561099ad2cbd4795e8de770a40ecb2a05a298996cfb316ca5dd10c55fa06e651cdb2327264d09099db1a8d9c68e59c6f2109556660a87bbbe682546602bdcf6e340270681392e54dd08d2e3ecba9ae346db27fe568624f9b476167a2353f3e0b761f24cea78f29461f011dda53c3d62c8079877052e1cf8b43680a4e4ac9ba86a8b8951e41c8eeb3a2789f34cbd776175d1ef4b989b4d9c2b08150abcc1ee387bf5b9508716aa63ab1c742808c594e3dbd94fe5ba99fcd311b85a7c44370627787a1e900992f367256d350678ba522692d7b07fc58488c41cb715abd9fc607d3b9fafa1c28c1082e4420795d43ee977fefee40e213946e402af2c4ab6f39ba2762ab99cfa7818722ded588b4b705422dded88a2453e84b4556c78224435cf22bdf9160f7b8c7c510f65eb3c3721c8d68e612ee4dbd21c72badb0c886937e594d9cb1ddabf0c717e8086ae29cf44a7d5d4d8e62e3410535b715bd2601cd20658e75e25fcc5a6d58b0b4a7adec33bb71438c1ad20eb76936af873860f3033d5e02fbe9d5499235a30594b8ae842884251772ca5e08cf985d309d25db3320ebf693be548c025dca1c96693e4e94f91acae388a75e02ba47e6874c2b991588e9e6cdf48cecfc20be3804ea610b5a5cc06940743876f39d1203bb40e39a42c4a3b798be82412f864f935721e26d5a904760842be50e0747ee08ce8c71904c9a141b76281229d4935fab964775e8c5bf235ed2a8493cc013ae9e2fbe1d940a831563ae66c8544e9ed39d61985decb171f23327edffc06e3785b57ef86b580dbc37ea84502c1661240ccd8b5722022b51bc46caebe4317d3507145cb2cee14f234633d36de63c8fa1889a1e958dc866ee7fc1c0b7fe792f807137b581c0fda7f3190d3ef5be8d37de470312ca14d4c8d99fac7f0b514f36f10df18987e81eb042f7f35919e233729bb4e52ebecc63a6dccf2064463d3af564ac6563f7d1e084d337254002ad760592e38d05896906ecd85f1567477cfc3edeef4a7b6cf5b05523164712f90a57b8bb8bc5a533df18661a3aba15b7b23ccbe3601144d8728d3a7973ce1fe0c0ee8071ee29b995cef11ca6e851d80a266dd3736190c61cee392c35229be673914ad5ef4a21f5020f841fafa57f91296dc4ac962a1569d3f31a8b7878c6ec22e71be83040b4fa9f71c89bfb54b6da73910e29f5924cf77e1bcd71640be4a97585b4d8febc2af2323a839855667312acf70a8f77edcdf0e517b20cc3e1aba15218f631f745822d1435846fc48082f351e30c4a58a673b0c3929b684732ed4931e9fc3ffe08f6f9f36a8513fabf5540e87bc67477d06bfbebe4cd31c6425d9547a60a9562bd5c190ba4be1440447ab25bd5bb2d6fc993153eea5d0929366111501cc58f7481f4de331a7ad8da492eb9dd5812265019bc63cb0e12395210ce786944b5999600f77b8227"}]}]}]}]}, 0xec4}}, 0x0) 08:36:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14"], 0x114}}, 0x0) 08:36:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000600)={'wlan1\x00'}) 08:36:26 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 08:36:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ab, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10}, 0x10}}, 0x0) 08:36:27 executing program 5: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) connect$802154_dgram(r0, 0x0, 0x0) 08:36:27 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200), 0x8) 08:36:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 08:36:27 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00', 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000700)={'batadv_slave_1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 08:36:27 executing program 1: clock_gettime(0x0, &(0x7f0000010100)) 08:36:27 executing program 5: socketpair(0x18, 0x0, 0xff, &(0x7f0000000000)) 08:36:27 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 08:36:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x1, 0x2, 0x0, 0x2}, 0x40) 08:36:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x10, &(0x7f0000000080)={0x0}}, 0x0) 08:36:27 executing program 1: socketpair(0x29, 0x0, 0x0, &(0x7f00000019c0)) 08:36:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ac, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:27 executing program 2: pipe(&(0x7f0000000600)) 08:36:27 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x3, &(0x7f0000000740)=@framed, &(0x7f00000007c0)='GPL\x00', 0x0, 0x46, &(0x7f0000000800)=""/70, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="3800000010001fff000004000000000000000ac1", @ANYRES32=r5, @ANYBLOB="0000000027a800001800128008000100707070000c00028008000100", @ANYRES32=r3], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r5, @ANYBLOB="bb"], 0x20}}, 0x0) sendmmsg$inet(r0, &(0x7f0000002240)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @local}, 0x10, 0xfffffffffffffffe, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @dev={0xac, 0x14, 0x14, 0x30}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x20}}], 0x1, 0x0) 08:36:27 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x8) socketpair(0x8, 0x0, 0x0, &(0x7f0000006240)) 08:36:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f000000e780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:36:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={&(0x7f0000002000), 0x8, &(0x7f0000002100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="845a8b160cc4a543544c944a230574458979b1", @ANYRES16, @ANYBLOB="000c2cbd7000fddbdf2502000000080005000000000008000700", @ANYRES32, @ANYBLOB="08000900030000000800090003000000060006000400000008000100", @ANYRES32=0x0, @ANYBLOB="0c0003000300000000000000080008000100000008000400ffffffff"], 0x60}, 0x1, 0x0, 0x0, 0x400040d1}, 0x20000000) 08:36:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:36:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) sendmsg$sock(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x41) 08:36:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000940)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:27 executing program 5: socketpair(0x23, 0x0, 0xf8f8, &(0x7f0000000180)) 08:36:27 executing program 2: socket$inet(0x2, 0x0, 0x10001) 08:36:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ad, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0, 0x60}, 0x1, 0x0, 0x7}, 0x0) 08:36:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x4, &(0x7f00000008c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) 08:36:27 executing program 5: syz_genetlink_get_family_id$gtp(&(0x7f0000002040)='gtp\x00', 0xffffffffffffffff) 08:36:28 executing program 0: r0 = socket(0x2, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}}) 08:36:28 executing program 2: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f0000001e80)='team\x00', r0) 08:36:28 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB='W'], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@ipv4={[], [], @empty}, 0x80, r1}) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8936, &(0x7f0000000000)) 08:36:28 executing program 5: pipe(&(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 08:36:28 executing program 1: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x3, &(0x7f0000001240)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x78) 08:36:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ae, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x5, &(0x7f0000000740)=@framed={{}, [@jmp, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:28 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 08:36:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@call, @alu={0x7}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x92, &(0x7f0000000100)=""/146, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 08:36:28 executing program 0: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$team(&(0x7f0000001e80)='team\x00', 0xffffffffffffffff) 08:36:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x4}, @NBD_ATTR_SOCKETS={0x4}]}, 0x30}}, 0x0) 08:36:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe8c, 0x4, 0x0, 0x1, [{0x290, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x85, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85ec"}, @NL80211_PKTPAT_PATTERN={0x12, 0x2, "e177e2972177e5a8b7fd35326c53"}, @NL80211_PKTPAT_PATTERN={0x31, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a4370f847d62"}, @NL80211_PKTPAT_PATTERN={0xf9, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b2ad81f9a"}, @NL80211_PKTPAT_PATTERN={0xbd, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a"}]}, {0xc4, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1f9fc1a2}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_MASK={0xae, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ff"}]}, {0xb00, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_MASK={0xaf7, 0x1, "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"}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x4}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x4}, @NL80211_PKTPAT_PATTERN={0x12, 0x2, "55c75fcfbb2c4fa999e353e2a754"}]}]}]}]}, 0xec4}}, 0x0) 08:36:28 executing program 1: getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) 08:36:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0, 0x60}, 0x1, 0x0, 0x2000}, 0x0) 08:36:28 executing program 5: pipe(&(0x7f0000001ec0)) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) 08:36:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="e80000000201010800000000000075d50d6200000c0016400000000900000003080003400800003f080015"], 0xe8}}, 0x0) [ 923.481000] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.1'. 08:36:28 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000100)) 08:36:28 executing program 0: socketpair(0x2, 0x5, 0xf8, &(0x7f0000000000)) 08:36:28 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000009c0)={'batadv_slave_0\x00'}) 08:36:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1af, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x4, &(0x7f00000008c0)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:28 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[@txtime={{0x18}}, @txtime={{0x18}}], 0x30}}], 0x1, 0x0) 08:36:28 executing program 4: socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) 08:36:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 08:36:29 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) sendmsg$sock(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000100)="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", 0x219}], 0x1}, 0x0) 08:36:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x578, 0xffffffff, 0x0, 0x128, 0x0, 0xffffffff, 0xffffffff, 0x4a8, 0x4a8, 0x4a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_macvtap\x00', 'veth0_to_hsr\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@mh={{0x28, 'mh\x00'}, {"619e"}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'sit0\x00', 'syz_tun\x00'}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "fb09"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'ip6gretap0\x00', 'vlan1\x00'}, 0x0, 0x200, 0x240, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d8) 08:36:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x2}, 0x40) 08:36:29 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3}, 0x8) 08:36:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x4, &(0x7f0000000740)=@framed={{}, [@generic={0x1}]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 923.811117] x_tables: duplicate underflow at hook 2 08:36:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x0, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:29 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000400)) 08:36:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b0, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003580)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xea8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe8c, 0x4, 0x0, 0x1, [{0x280, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x87, 0x1, "b35645518e73b8f91b8162c80da31253c0dfb5dd4e071b162d74128e590324e5e5adb3e8814004a27c0e6c9774096c454050503dcc799805d91e93b702d774275f459a12298b5dbe9cef56260c9c57b01562543c338958ee4b71132128a8ca1f461003fc17e0598e5e839e58d4982f8107e3bbc600ef77e8027b47cb93408a85eccd11"}, @NL80211_PKTPAT_PATTERN={0x8, 0x2, "e177e297"}, @NL80211_PKTPAT_PATTERN={0x2d, 0x2, "02ff433c6f3fb50e330e77d40e5b250ab599cfb8b9c20f4e3905d914c60f4e21b2cc63f0e3bcd0a437"}, @NL80211_PKTPAT_PATTERN={0xf5, 0x2, "b9d89cd870c2cdb83dc93a1e8c67166f3eb8bdb930e6f5d9b18d520f82baaef6c31e284bac63e87515eb9c7ea3410e5e467e035e70a585071d2cdcd0bdba194eedeadd8a872c71f15d1366226b06cf8b84e306a0db43b5f109ee922eb213a156979bcadbc7a092b85728c6c2dc43a0e2837b496f87bb04adfd8209ea86429d0e487dda11d833938804c361ff0e9eb8fc0b34684f8c507d4c33cae56504649aaec5727c8aa6d3cbdef38fab82ce8beb843d2bc5b28190a11870d746e02d87df434b3b5633f9c353ba59376ed63e110c611a874b57cefdaf143ef4abe863b30f0a394b7d482a0e9494ef1f81a128ba0f0a2b"}, @NL80211_PKTPAT_PATTERN={0xc1, 0x2, "1ea94bf3a6b97315d3ebc39d63eb7bb28266cbe7cc6cf8d52e7594b969bed71d0fd87f0aafdd3248149cda498361b50cf33c903643101a93959f1bd693c54c630690b7cf842903311917440866c1ce473ac0d8690c35f23f103138908567ce798945f5376229fd333405ed07802b6d8146ff39f459ff9815ad36c471d97ca0c050740c590fe88c140951e0ea427623d5242e9467ce8dcb30315729c20740fddfe262d7ac5c0f5ef547046a9f846849f85a7892bd9dd2ab572a3e8e550c"}]}, {0xf8, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "d038576674df33313e60e3e523c7c337338993fa4962094352a08d2baac625bc8bbff3572ea90cae206eb75352e87d92d90345f915a4fd535f3b4661032b5b1128dacb82ac29e1ea59ba2ca8a855455938884df3c9cd22e4d1caafd3fff0ce4ea1ed06f15b65761ae6b6631afbc6b90e7d7d0301ad2fb77828e3c2111f3a87c4191e6391826a9f8eeceb85afd6e8086f53f493de48e355b86b56b85dc81b1f1aa71f4ae93162314015ffd08bb95ba972fa78ab6d19e955389d861fcad047ac35aa58e8fd8f4884713af3f4d1076b5a9dba6137a711"}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x5}, @NL80211_PKTPAT_MASK={0x26, 0x1, "dd221a29ff28576303519343819633a12a51e338621706190399004c902a05ccd4fe"}]}, {0xadc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x3d, 0x2, "5aa639de20faa609c8a406ab7c908fa96f8adabe051a677322a76738e2582c6999c5e7e7d79d137a2c00081fd0272b7ed6e803611291ee4784"}, @NL80211_PKTPAT_PATTERN={0xa3, 0x2, "af1b600794a3bf0602cab73da9d6b78db56c48541847f77c87f0ee4e82ee9431a5f7bf2057d2339745b48dde3b4cdb2b6c154472155d08b8d376318faee3096d7c76640dc01d72bdd17348b9cc37d60090f156ab649618da9c6576adb5989afb102766a89d09f6d9b4c507ccfbe2fe39bcd7948018f77dbf12f831b2dc2f13e10a6c5bcf5914a420d1119cd51f23fcee47f92a5bdc8f355ba5e08d84a111a8"}, @NL80211_PKTPAT_MASK={0x9e9, 0x1, "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"}, @NL80211_PKTPAT_OFFSET={0x8}]}]}]}]}, 0xec4}}, 0x4800) 08:36:29 executing program 1: clock_gettime(0x0, &(0x7f0000005f00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005f40)={0x0, r0+60000000}) 08:36:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x6, &(0x7f0000000740)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:29 executing program 5: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x8, &(0x7f00000008c0)=@framed={{}, [@map_val={0x18, 0x9}, @generic={0x0, 0x5, 0x8, 0x0, 0x81}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @alu={0x4, 0x1, 0x5e6bdecebf55e8bd, 0x3, 0x9, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000940)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0xfeae}, 0x10}, 0x78) 08:36:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000009c0)=ANY=[], 0x74}}, 0x0) 08:36:29 executing program 2: r0 = socket(0x18, 0x0, 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={0x0}}, 0x0) 08:36:29 executing program 4: r0 = socket(0x1e, 0x5, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) 08:36:29 executing program 1: socketpair(0xa, 0x3, 0x3a, &(0x7f0000000000)) 08:36:29 executing program 5: unshare(0x480) syz_genetlink_get_family_id$team(&(0x7f0000001e80)='team\x00', 0xffffffffffffffff) 08:36:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 08:36:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x0, 0x128, 0x0, 0xffffffff, 0xffffffff, 0x4a8, 0x4a8, 0x4a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_macvtap\x00', 'veth0_to_hsr\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@mh={{0x28, 'mh\x00'}, {"619e"}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'sit0\x00', 'syz_tun\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'ip6gretap0\x00', 'vlan1\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) 08:36:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b1, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:29 executing program 2: socketpair(0x2, 0x5, 0xc6, &(0x7f0000000000)) 08:36:29 executing program 1: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)="04b3e5d1758b09", 0x7}}, 0x0) 08:36:29 executing program 5: r0 = socket(0x18, 0x0, 0x1) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={0x0}}, 0x0) 08:36:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x4}]}, 0x30}}, 0x0) 08:36:29 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 08:36:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f000001dac0)={&(0x7f000001d900)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f000001da00)=""/141, 0x26, 0x8d, 0x1}, 0x20) [ 924.395963] ieee802154 phy0 wpan0: encryption failed: -22 08:36:29 executing program 5: syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00', 0xffffffffffffffff) 08:36:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0, 0x60}, 0x300}, 0x0) 08:36:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x578, 0xffffffff, 0x0, 0x128, 0x0, 0xffffffff, 0xffffffff, 0x4a8, 0x4a8, 0x4a8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xffffff00], [], 'veth0_macvtap\x00', 'veth0_to_hsr\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@mh={{0x28, 'mh\x00'}, {"619e"}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xffffffff], [0xff, 0xffffffff, 0x0, 0xffffff00], 'sit0\x00', 'syz_tun\x00', {}, {}, 0x0, 0x0, 0x1, 0x40}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}, {0xfffffff8, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20]}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0xf, "fb09"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'ip6gretap0\x00', 'vlan1\x00'}, 0x0, 0x200, 0x240, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'batadv_slave_1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x80}}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x0, 0x0, 0x80000001, 0xa255, 0x5]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d8) 08:36:29 executing program 1: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000100)) [ 924.556061] x_tables: duplicate underflow at hook 2 08:36:29 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x39f040, 0x0) 08:36:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:30 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005800)={0x0, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000000000000000000d4cc2cf3b3360e82ca50a50352152db8a5cf2480527c7a738c3ec9b9dd1caf62a3cba5e4d58ca3c338bee5b920da90560f1f8ff32a78591cfa5bd1b6233d0fe301edad64a5b2b309379170d98d3fc67e477fe93d372f4c3b58fec6e79681e0507f0d2eb29697b4f8cc108300116f7ffffffffffffff652f46c0b26262a1179f8b49fd826cb392a3d85b6cf2c679253a1d2ee390b80cc2895c85516cc90ba1010403261a99cc805c00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x730, 0x408, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040)}, 0x8160, 0x0, 0xc8}, r2, 0xe, 0xffffffffffffffff, 0x2) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffcff) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="62202a3a6cd124f54c3a693e5f016c12ab6ab7956a3710138f0f0a7141cef43aa8d293c843149607d8f9c8bf86a19bce679b1e69a1cb13358c58b4e2548d14670e192ee93a4935df327c0ee62ab32eb58b86795c3357a243"], 0x8) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x1, 0x2, 0x1, 0xcc, 0x0, 0x3, 0x8002, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8, 0x3f}, 0x4200, 0x7fff, 0x1, 0x2, 0x1, 0xf2, 0xffff}, r2, 0x1, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) 08:36:30 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000000940)="77b9", 0x2}, {0x0}, {0x0}], 0x3}, 0x0) 08:36:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000004980)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x5}, 0x40) 08:36:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x5, &(0x7f0000000100)=@framed={{}, [@alu={0x7}, @call]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000180)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:30 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000ac0)={0x9}, 0x8) mkdir(&(0x7f0000003640)='./file0\x00', 0x0) 08:36:30 executing program 4: socketpair(0x23, 0x0, 0x0, &(0x7f00000002c0)) 08:36:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f000001dac0)={&(0x7f000001d900)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f000001da00)=""/141, 0x1a, 0x8d, 0x1}, 0x20) 08:36:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) 08:36:30 executing program 1: perf_event_open$cgroup(&(0x7f0000000a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 08:36:30 executing program 2: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740), 0x10) 08:36:30 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004f80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 08:36:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b3, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:30 executing program 4: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000f40)='syz0\x00', 0x1ff) 08:36:30 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000002c0)={r1}) 08:36:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="9e", 0x1}], 0x1}, 0x0) 08:36:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffe6f, &(0x7f0000000100)="280e003f4305607e5bc5795e6558070800ffffffba0e7200ffff81", 0x0, 0x1c, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500000000000e00000000000000"}, 0x28) 08:36:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0x1d, 0x4, &(0x7f00000006c0)=@framed={{}, [@jmp]}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x8}, 0xc) 08:36:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b4, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f000001dac0)={&(0x7f000001d900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f000001da00)=""/141, 0x1a, 0x8d, 0x8}, 0x20) 08:36:31 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f00000001c0)="c9", 0x1}], 0x3}, 0x0) 08:36:31 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={0x0, 0x0, 0x18}, 0x10) 08:36:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000003600)={0x0, 0x0, &(0x7f0000003500)=[{0x0}, {&(0x7f0000003140)="05", 0x1}], 0x2}, 0x0) 08:36:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 08:36:31 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 08:36:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003040)) 08:36:31 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003040)) 08:36:31 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000000940)="77b980cdf448e49320b245035894a48f45384c8a81d36a84ccf4eae43574de0f6ab62a9fe47de294d03876512c995d704c5912547b4f606321d8f4b2ba26391db766f8c6f844f337802a84fa95735309edc0453a725f2bfca5d33e39679802ca4611412a9a4c8aef206a059bf66bc3e3a1122a43ce943196e0da7f642125b66cb5c3d421da3da0981f3d9b132dd85c0fb9ac8803f0e931a841d42865ca6790e5b4c7acfedf30124dc774230d6f92b7a509b1a9cf5140d22b6076c4e5c160e619ef26906e45ec9004fa1be9906ec4ad23be72018d9b74756965c23dc40e15b4028db4ba5dc8a006a44527b9fd3793e2e6086e4491f0dd80c7bd9fb12e8e04d278695604145966db563aa916a6391e9b29d240be8a44168dfed00581ed0d421730bec908034fee2410ecabb2c186bf737d10c6c06123b46cad87bbc7f1d4907e87491e57343b76116260c9d65e3be806c7565c5d8653c0bb5439b262ac3cba4e0e4ba65740bfc644b14bd47f07eb287f73bf0bbd2108f0121cfcb416c6aa9bd3031f396527b6114d00b3d8e681dbb61d7b2282b878c4c614268f2415c5896722e39bdc723105042e196e23e350c8d2aa9e7d069d9ea8d36e9f802a2746d2a0a0bc7b3d83e8fe2237af317b9a8fff6c5664a36f5756de56c2761e002206e4b1e14e52579310445ca8887c7d5a87c57eb10bbef6b7ad457857037ff5c309a9dcafe47f08520183fa0aff8ac78ec3a34bced5a93ef78055ce1fd612b60f9302f01fca04289d8df4e7b405ab1e1598140ea11898fc7664ea1f118317c014f705ec93b99fd3f0cadf9c01c2d0f732737a232b06929b97fe888980985c5d27dd88a6af7d80d72951ce3753db077eb5bb40e14a93479731d813294a11a636b9b57bc938ea2aeaaaa19eeb84e35473054360080c205d318de17616756ed9a78ba1a715d4d4e21a49b0bdb7fd9450141fab39dd700fa4e016e5913000d3ecac5d4ae8cb9cf0afbf3038ea33c28f0985c51db2968342cea581527c2fb8178ab0dfbbb4b5d90b27779031937eeee2b3b91350df41c19bfadb5b84fa7505ea5ca5e325ee566465d36af597dd57c51e78a303339c6181b89529d8a34255256a754fac4f238964bdfc3aac3d6de6d31af2fb467d58af13de3c06b639016a5019c7e9e224aec9112ecd52593f05f1c356aad0bd4b8ae7d29c28e365e1a76064bf618126c1774c9c945c97aff16564e0ba41720460fc23d082be3e616e685c3624e1886cc3fe5712085d4f9b80c7373937bc58f74075ef4749b1ea4bce560a980c9e1b65dad4df8f563fb566c9588779d537af06c789aedc2b303fa09c71780c3646b3c05b6688ecbcb6fb21d5abd5e24ca86cb44873683e5cfc6de03928fc4fbf43204c70b98599a37c33cd3863ca306cf07032ba72d231fb8ee0ef55f8a7a57e06c97f9db701255c776d0d6088288e730e3ff5acf899f4e26b70089d6b4cf74649a0ead6d43d1dfdf61911d6c5790557e60fdeabbc7aed072c53908b932f5cf11a15022b2e3afe6636d017fa95a9f3cd962270a8a25fd5cf2585ff9fb85cf4434c6eda67273acc52a47ae5e9dbb25fee86ef45c90c462246d3541704c0843bf270510607501cedd5ab5ccb56551c62e242f62181d29f70aa05d4b4859fd8bb51f7d050fd2d08a8e61da2b42b6a57cc6803d18fdffeffe522f1d6b3ee53d91fd5325f8d8e6e392c5c025a916fd4c45413b5fc6e013cb11c3354e7d435fff6e7898261212f12ac536846a60e7e24addfa4324863ac78c6a6f6d40915434fd83809137c12d9cf46a61315d890ac0cf63cf6922675b87b2810c93d8d529e9089fb7b206b8ade77958aa4a19ba8f2d02ddb00cc0fbe9c6c577feba3786b8d057e918f07c5cb93619586157fbd85240a811210ab2d65e16defd5f8419154126f9a944f727a485fff07c4a83a1a1cddf67d7b6de650a276c8a9f2627b7d1e273e011dd53e333f695370041f807f9185ea939f2deeb7cf5eb764fa2adc6195cdc0a53529cb251acf4be3cd3efc5f13b976632f6521b41cdae500a5d1c983835c8bce172eea2992062b9b9442baa1c818533393614837bf8ab13fbcea9b64c8f9cc0be9359c22c06c584eba7983ef689b6c392ea4e27aa2961e59f5055292756489bcb97ec09723378b081ce5ab3ad36dcac8ad70b919449b88ac72d753b6750125192c83a95381db4167e5c7c55f63fe7473d6a4e7d4b4fd47b6f1861182d4d1ef20ec1e21187f772206fafb1f70b0cf5735ea81003a803d65929014f56e127eccafff19da2acb1de2924c4d654ef2dd3afe0ea28f682640f8f3e9301942b8882aedc4c40dd12676b3e5a6e97c8c53e4a14458", 0x687}, {0x0}, {&(0x7f0000001980)}], 0x3}, 0x0) 08:36:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f000001dac0)={&(0x7f000001d900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f000001da00)=""/141, 0x28, 0x8d, 0x1}, 0x20) 08:36:31 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000005040), 0x10) 08:36:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x15}, 0x40) 08:36:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x2) 08:36:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x104, 0x0, 0x0) 08:36:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) dup2(r0, r1) 08:36:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0), 0x98) 08:36:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x100, &(0x7f00000002c0), &(0x7f0000000000)=0xac) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200)={0x0, @in, 0x68}, 0xa0) 08:36:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000040)="c6", 0x1}], 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000840000000a00000000000000000000000000ffff7f0000011c000000840000000a000000fe8000000000000000000000000000bb100000008400000008000000f7ff000014"], 0x5c}, 0x0) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="319da03f49f7c662aae446a3b4b446d5997be6d2aeb87610febace8d82c79301d4ed2004b5ba5bcc5198ddb945dcf5cc78fe47f0fbfac21a5bc54531b8227d0717", 0x41}, {&(0x7f0000000340)="004a054e38335da2b8eead1c14e915d98d085b8c6f0e72cf2d1616591bf72e126f00e7b6513650d48be24c2ef890ebf6bf0ce715a91fe9646d6d12868bd487bb12937927a0d714aff331608ed778040b08471299fd2c3241ddaac0c3cee3effb92c0beab67565ad6d971b6885d34245ac0fe4dd93d579c006134133c1076035ccd0f5275df028ff82a92b92fbc38d38d950293e5daef8976a9a1d77f63d0919a5febfc017c4dfd327c26956cf1d07c7351296240e2921950942ac04b3d631f6d7f38fd71e7598e1f", 0xc8}, {&(0x7f0000000c80)="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", 0x490}], 0x3}, 0x0) 08:36:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b6, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="050000000000000000000000090000004b"], 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000002c0)=ANY=[], 0x98) 08:36:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x84) 08:36:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000280), &(0x7f0000000340)=0x4) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)='1', 0x1}], 0x1}, 0x0) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001e40)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001d40)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, [], 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}], 0x2c}, 0x0) 08:36:32 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x2900}}], 0x1c}, 0x0) 08:36:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000300)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x2900, 0x0, 0x0, r5}}], 0x1c}, 0x0) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000002a40)=ANY=[@ANYBLOB="1c1c4e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066cbcb4bf282d00d"], 0x98) 08:36:32 executing program 2: r0 = socket(0x1c, 0x10000001, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x23, &(0x7f0000000000), 0xfe6a) 08:36:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 08:36:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001600)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1000}}], 0x1c}, 0x0) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/150, 0x96}], 0x1) shutdown(r0, 0x0) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="001c4e22000000000000000000fd"], 0xb1) 08:36:32 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 08:36:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000180), 0x8) 08:36:32 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000240), &(0x7f00000000c0)=0x4) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 08:36:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001600)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@prinfo={0x14, 0x84, 0x7, {0xf}}], 0x14}, 0x0) 08:36:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000f40)={0x10, 0x2}, 0x10) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000008c0)=ANY=[], 0xa0) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000380)={0x5, 0x3, 0x0, 0x3, 0xe0, 0xff, 0x20, 0x3, 0x12, 0x9, 0x80}, 0xfec7) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0xb) 08:36:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b8, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000040)="93b709273dee80f965", 0x9}, {&(0x7f0000000b00)="690dfc135cfb3fdfb31a81a48884ba2cf767e22c15ea552a169374e394801b8023862db84a9f9d601ba94bdabcc8a2d376608320b50d3560beca90f08b193fa48bc68d10ec948735911db8218d7e80d2759b742e48d0159a84c744f32e151abf94bd6b6ab40e106832c38b4ce0de98e6988fc2a40baa0d0e7b58361fdf49a91d689b8a978aa5f2e3179a41b2ae675581", 0x90}], 0x2}, 0x0) 08:36:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000100), &(0x7f0000000140)=0x8) 08:36:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 08:36:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="a6", 0x1, 0x0, &(0x7f0000000180)={0x1c, 0x1c, 0x2}, 0x1c) 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f0000000040), 0x4) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000380)={0x5, 0x3, 0xd, 0x3, 0xe0, 0xff, 0x20, 0x3, 0x12, 0x9, 0x80}, 0xfec7) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0xb) 08:36:32 executing program 0: r0 = socket(0x1c, 0x10000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) [ 927.539843] sctp: [Deprecated]: syz-executor.5 (pid 18546) Use of int in maxseg socket option. [ 927.539843] Use struct sctp_assoc_value instead 08:36:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3}, 0xfec7) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0xb) 08:36:32 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x80, 0x1c, 0x3}, 0x1c) 08:36:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000b00)="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", 0x104}, {&(0x7f0000000080)="c2e030bc3b25717c5fcb6aa0ea55275cb00970f80ed388369431f5", 0x1b}, {&(0x7f00000004c0)="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", 0x400}], 0x3}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 08:36:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000b00)="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", 0x15a}, {&(0x7f0000000080)="c2e030bc3b25717c5fcb6aa0ea55275cb00970f80ed388369431f5", 0x1b}, {&(0x7f00000004c0)="6fa903692ff7508648f574a03e87902e4f6d0da5522ed41a7a9270a40879051808d9e80dd7182c5a6e89a3993c0468b862413ba82e029d7a5e1aa5e54ef417bcf24380da2c881e8bd8f22029707f2f0079a21e512873870f7096e58108fe31de4836be5238bdd78f62f5d110217486e58fca46ef2e2bf045546c3bfd4b7fa62bebe0b765368efb553ba89ec0b2ffcc843780b9cfb806e913c2cb0cb1c05eb9ab372fb2051f108b569c1eeec4e2ae0a81f8c47e986e69a242eaba79ec73257288d62b3293ef689fb80769c5300fbf51140699da7c332b46b86051a853ee73b77047cffaed11957648a96d4e5cf8e23a179e112419bc9524ded8508041e94355d887613dae89b6fcb8d36a1d839d3757e99c7fcd5d0a899628ab071b0642fe07f9130ef85853b984b35993261bca7ae5b1455f22743b8c2086fc86f2b1964f6164f841f4552ad28a21358b110cc77a09011295999c9d0cb9dac6fe649c883ce9d0eacfca7b0131e4801d441f1b1539f30bece407e90b65e8ee23c6d866913cf4a96bbd82908fcb8b0beea047f7c6ed521d8b6e016d736befb920cc992ad9f2a4574ac490a5643f3b7b307aecd92f41312e47ab5efad635ab0f1ee1121cdafd6e9f3f642e32a77ed2d406760759ca0c0c0a1898cf3d3efd771b113d88a479b9ddb9b091316422260e5d52a10357bb43f56bf852feff585367a83621ab6bb460c4dfee2e5fa28b446a0eb62c37a7384ae6e86b927f08067f6ad760b1ac6ba022d2846e637fd54d00de715b6daabe65d6b6302a48d9f479021d2b60a2ba63094b734aa7e71b4ca56915f87faf75080f8991f9336efa4beea9dba25871dd806053b579aa16ffc893ed9201cf3a9ea224186b383df8741caad54c5e128de827941b52fbe5d4f1df0137c05777c660156afaf557eaa765b0932c46ea25938595ecddaa45610c492df591f7c8ab41f50aa909f21dfa6915b819eb4fac1115fcf5d761207a6405fe96b8aec40d05eff2339160e2fe6a85545c5d97c32641427352d87137f7ebcffe05cc3952b2c4affe3ba4463d14396960ea6a0b39d1285e52c4b574ee2d9baa571d0fe3a904c725e68e1abfe2bda36dc6cd0b2d8755c92f18aacdaad3bc139e266f71a638714025e2bc2bf137d81d49e0b30093b83ec204c198311d46fd002536eb8aef4ac699aeffb3464462115bcb00d8e2c947ee49fff15f4c6561185b711c8401eb62af0d76f57bb8b83c52f8787309512a163e09eb41e0a12c127e473650c7d52e88a5f239a9b3a17acd975a07492d6b21bdbcdd6a77f664cb5eed99defd90831e4d7c7537a04c10f5debddafaa8e739ae6bbdc60fdd7d4693d9ddecc4e516eafe6c6df03031112eca6d0c5e6cef09fca09ce7d3dd56836f860a4ebbec16e328e9a3b2c6893a39402b8ec266ec3d7171bbf2737e5dd9d82e499d88d9ca0fc529a6876a4c15388205e7a336d8f9a52d53baf2c7e5d942c08b885e2121d29f6e4cdd028ecbd089e3b6d9b5eb54e3dc646ce9c249aec9ca5c7608aae86a4fae02d90ff10be0c65b7cdb27893f4ffe248e3ef19881e8451ab3130a245140bb6d8c1c4dd7fe1a80a62aa9324dccabdb7a23036cc2c260bae1969e8a3cabb5774dc00a309b71acb3a9a7b7575c3dc7212bc9caf35ae948ad9cb3fe15c4747f7554ee97811a3c", 0x4a8}, {&(0x7f0000000c80)="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", 0x49c}], 0x4}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 08:36:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b9, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x3) 08:36:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), 0x98) 08:36:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000100), &(0x7f0000000140)=0x8) 08:36:33 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="a6", 0x1, 0x104, &(0x7f0000000180)={0x1c, 0x1c, 0x2}, 0x1c) 08:36:33 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) recvfrom(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 08:36:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000002a40)=ANY=[@ANYBLOB="1c1c4e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066cbcb4bf2"], 0x98) 08:36:33 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x2}, 0x1c) shutdown(r0, 0x0) 08:36:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0xfffffffe}, 0x10) 08:36:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x80}, 0xfec7) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0xb) 08:36:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 08:36:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000002a40)=ANY=[], 0x98) 08:36:33 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fchownat(r0, 0x0, 0x0, 0x0, 0x0) 08:36:33 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000000)={r3}, 0x14) 08:36:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x42, 0x0, 0x0) 08:36:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe2(0x0, 0x400000) 08:36:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ba, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:33 executing program 4: fchmod(0xffffffffffffff9c, 0x0) 08:36:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000f40)={0x10, 0x2}, 0x10) 08:36:33 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32], 0x3ef) 08:36:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@raw=[@func={0x85, 0xa, 0x1, 0x0, 0x1}, @exit, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xeb, &(0x7f0000000080)=""/235, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 0: bpf$BPF_BTF_LOAD(0x20000285, 0x0, 0x0) 08:36:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000000601"], 0x14}}, 0x0) 08:36:33 executing program 2: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000000)) 08:36:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x32, 0x2, [@array]}}, &(0x7f0000000200)=""/263, 0x32, 0x107, 0x1}, 0x20) 08:36:33 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8970, &(0x7f0000001a00)={'batadv0\x00'}) 08:36:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5460, 0x0) 08:36:33 executing program 2: socketpair(0x11, 0x0, 0x9, &(0x7f0000000000)) 08:36:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1bb, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="b4cfbb41ff4047253556c3796b194e38", 0x10) 08:36:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x21) 08:36:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x7, 0xff, 0x0, 0x1, 0x0, [0x2e]}, 0x40) 08:36:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000002500)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername$netlink(r1, &(0x7f0000000080), 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@ipv4={[], [], @rand_addr=0x64010102}, 0x8, 0x0, 0xff, 0x4, 0x2, 0x1ff}, 0x20) 08:36:33 executing program 4: syz_genetlink_get_family_id$gtp(&(0x7f0000000100)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x20000000) 08:36:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8904, &(0x7f0000000000)) 08:36:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140), 0x4) [ 928.491944] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 08:36:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @func, @alu, @alu, @btf_id, @exit, @generic, @jmp]}, &(0x7f0000000300)='GPL\x00', 0x2, 0xa1, &(0x7f00000000c0)=""/161, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x0) 08:36:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 5: r0 = epoll_create(0x322c) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x0, &(0x7f0000000140)={[0x101]}, 0x8) 08:36:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1bc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 08:36:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xeb, &(0x7f0000000080)=""/235, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:33 executing program 0: syz_emit_ethernet(0x5a2, &(0x7f0000000c40)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd66"], 0x0) 08:36:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0xd}]}}, &(0x7f0000000180)=""/243, 0x2a, 0xf3, 0x1}, 0x20) 08:36:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)={0xa5fc3c2982065f6f}, 0x40) 08:36:34 executing program 2: bpf$OBJ_GET_PROG(0xe, &(0x7f0000002140)={0x0, 0x7}, 0x10) 08:36:34 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0x10}}, 0x0) 08:36:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000001a00)={'batadv0\x00'}) 08:36:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8940, 0x0) 08:36:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1bd, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r0, 0x0, &(0x7f0000000100)) 08:36:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) 08:36:34 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 08:36:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, &(0x7f0000000500)=@framed={{}, [@ldst]}, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:34 executing program 1: setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000180), 0xfffffece) 08:36:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x13, 0x4) 08:36:34 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @link_local, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @random="7f0b4c8ca8bd", @dev, @dev, @dev}}}}, 0x0) 08:36:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1d, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x40) 08:36:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000b40), 0x4) 08:36:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x7ff, 0x0, 0x95, 0x0, 0x1}, 0x40) 08:36:34 executing program 5: syz_emit_ethernet(0x76, &(0x7f00000001c0)={@multicast, @random="e61edcae8744", @void, {@ipv4={0x800, @tipc={{0x10, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote, {[@ra={0x94, 0x4}, @generic={0x0, 0xb, "a7823f155e57255040"}, @ssrr={0x89, 0xf, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @broadcast]}, @lsrr={0x83, 0xb, 0x0, [@loopback, @empty]}]}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x0) 08:36:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1be, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:34 executing program 1: syz_emit_ethernet(0x5a, &(0x7f00000001c0)={@multicast, @random="e61edcae8744", @void, {@ipv4={0x800, @tipc={{0x9, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote, {[@ra={0x94, 0x4, 0x1}, @generic={0x44, 0x4, "a782"}, @ssrr={0x89, 0x3, 0x49}, @end, @lsrr={0x83, 0x3}]}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x0) 08:36:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x7, 0xff, 0x0, 0x1}, 0x40) 08:36:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 08:36:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000009100)={0x9, 0x3, &(0x7f0000008f80)=@framed, &(0x7f0000009000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:34 executing program 5: pipe(&(0x7f0000000000)) socketpair(0x26, 0x80000, 0x0, &(0x7f00000012c0)) 08:36:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000180)=ANY=[@ANYRESOCT], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@remote, 0x80, r1}) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000000)) ioctl(r2, 0x8936, &(0x7f0000000000)) 08:36:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='lp\x00', 0x3) 08:36:34 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$packet(r0, 0x0, 0x0) 08:36:34 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5450, 0x0) 08:36:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 08:36:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x10}], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1bf, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:34 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000080)={@local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "04e8d2", 0x4c, 0x2f, 0x0, @loopback, @rand_addr=' \x01\x00', {[@fragment={0x2c}]}}}}}, 0x0) 08:36:34 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890c, &(0x7f0000001a00)={'batadv0\x00'}) 08:36:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="83"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r2, @ANYBLOB="00810000bb02ffff"], 0x2c}}, 0x0) 08:36:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8d}], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:34 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x30], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 08:36:35 executing program 2: socketpair(0x28, 0x0, 0x9d5, &(0x7f0000001080)) 08:36:35 executing program 1: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000380)) 08:36:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, 0x0, 0x0) 08:36:35 executing program 5: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@multicast, @random="e61edcae8744", @void, {@ipv4={0x800, @tipc={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @remote, {[@ra={0x94, 0x4}]}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}, 0x0) [ 929.763268] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 929.851570] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:36:35 executing program 5: bpf$MAP_CREATE(0xfa00000000000000, &(0x7f0000000080)={0x5, 0x9, 0x7, 0xff, 0x0, 0x1}, 0x40) 08:36:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@call], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c0, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:35 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @link_local}, 0x10) 08:36:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, 0x0, 0x0) 08:36:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x1}, 0x40) 08:36:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 08:36:35 executing program 5: unshare(0x20060600) r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 08:36:35 executing program 0: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8902, &(0x7f0000000000)) 08:36:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000bc0)) 08:36:35 executing program 2: socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) 08:36:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000200)=""/263, 0x1000000, 0x107, 0x1}, 0x20) 08:36:35 executing program 1: pipe(&(0x7f0000001580)={0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:36:35 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x96) 08:36:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c1, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x8, 0xbc3, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 08:36:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x1, &(0x7f00000002c0)=@raw=[@call], &(0x7f0000000300)='syzkaller\x00', 0x7ff, 0x8e, &(0x7f0000000340)=""/142, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000180)) 08:36:35 executing program 2: r0 = epoll_create1(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 08:36:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0xff}, 0x40) 08:36:35 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 08:36:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x4, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xeb, &(0x7f0000000080)=""/235, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x13, r0, 0x0) 08:36:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 08:36:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xeb, &(0x7f0000000080)=""/235, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:36:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={0x0, @l2tp={0x2, 0x0, @multicast1}, @can, @l2}) 08:36:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x200002e0, [@array]}}, &(0x7f0000000200)=""/263, 0x32, 0x107, 0x1}, 0x20) 08:36:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8934, &(0x7f0000000000)) 08:36:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@empty}, 0x14) 08:36:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000002500)) 08:36:36 executing program 1: syz_emit_ethernet(0x92, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f78e93", 0x5c, 0x2f, 0x0, @private0, @rand_addr=' \x01\x00', {[@dstopts={0x0, 0x2, [], [@enc_lim, @enc_lim, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo]}]}}}}}, 0x0) 08:36:36 executing program 4: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x7) 08:36:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8941, 0x0) 08:36:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), 0x14) 08:36:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x7, 0xff, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 08:36:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000880), 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r1, &(0x7f0000000880), 0xc) 08:36:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x1) 08:36:36 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 08:36:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000280)) 08:36:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 08:36:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c3, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:36 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0xc0) 08:36:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x34) 08:36:36 executing program 2: r0 = gettid() sched_getparam(r0, &(0x7f0000000240)) 08:36:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) 08:36:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000280)) 08:36:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x2, 0x0, 0x0) 08:36:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='user.incfs.metadata\x00', 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='user.incfs.metadata\x00', &(0x7f0000000140), 0x0, 0x2) 08:36:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x2) 08:36:36 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 08:36:36 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 08:36:36 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='user.incfs.metadata\x00', 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='user.incfs.metadata\x00', 0x0, 0x0, 0x1) 08:36:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c4, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) 08:36:36 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000540), 0x8, 0x0) signalfd4(r0, &(0x7f00000000c0), 0x8, 0x0) 08:36:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 08:36:36 executing program 2: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 08:36:36 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 08:36:36 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='user.incfs.metadata\x00', &(0x7f00000000c0), 0x0, 0x1) 08:36:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) 08:36:37 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xa400, 0x0) 08:36:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='user.incfs.metadata\x00', 0x0, 0x0, 0x2) 08:36:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 08:36:37 executing program 4: unshare(0x4010000) 08:36:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x4000) 08:36:37 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) 08:36:37 executing program 4: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000ff3000/0xc000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x1000) 08:36:37 executing program 0: prlimit64(0x0, 0x9, &(0x7f0000000040), 0x0) 08:36:37 executing program 5: r0 = shmget$private(0x0, 0xc000, 0x0, &(0x7f0000ff3000/0xc000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000200)=""/25) 08:36:37 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x80000001}) 08:36:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "c8"}]}}, &(0x7f0000000100)=""/136, 0x2a, 0x88, 0x1}, 0x20) 08:36:37 executing program 2: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) write$cgroup_int(r0, 0x0, 0x0) 08:36:37 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000380), 0x10) 08:36:37 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1bd, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1b7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c6, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1aa, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x187, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x17a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x174, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x152, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 932.780338] ieee802154 phy0 wpan0: encryption failed: -22 [ 932.786012] ieee802154 phy1 wpan1: encryption failed: -22 08:36:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x14a, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x174, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x138, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x126, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x117, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c8, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x174, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xfa, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xf5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xea, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1c9, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x117, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x174, 0x5000000, 0x0) 08:36:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xdc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xdc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ca, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) 08:36:40 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0x1, 0x81, 0x6, 0x0, 0x4, 0x40800, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x5, 0x5}, 0x164, 0x800, 0xfffffffb, 0x7, 0xb2b, 0x2, 0x20}, r3, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 08:36:40 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x117, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:40 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xea, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 934.960563] device wlan1 left promiscuous mode 08:36:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xdc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 934.998423] device wlan1 entered promiscuous mode [ 935.030804] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 935.051511] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:40 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0x1, 0x81, 0x6, 0x0, 0x4, 0x40800, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x5, 0x5}, 0x164, 0x800, 0xfffffffb, 0x7, 0xb2b, 0x2, 0x20}, r3, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 935.242564] device wlan1 left promiscuous mode [ 935.273735] device wlan1 entered promiscuous mode 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 935.308819] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 935.351905] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:40 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0x1, 0x81, 0x6, 0x0, 0x4, 0x40800, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x5, 0x5}, 0x164, 0x800, 0xfffffffb, 0x7, 0xb2b, 0x2, 0x20}, r3, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) 08:36:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1cb, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:40 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xd2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xdc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:40 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 935.540672] device wlan1 left promiscuous mode [ 935.585202] device wlan1 entered promiscuous mode [ 935.612880] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 935.655989] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:41 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xea, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:41 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:41 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0x1, 0x81, 0x6, 0x0, 0x4, 0x40800, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x5, 0x5}, 0x164, 0x800, 0xfffffffb, 0x7, 0xb2b, 0x2, 0x20}, r3, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:36:41 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xd2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1cc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 936.059527] device wlan1 left promiscuous mode [ 936.076138] device wlan1 entered promiscuous mode 08:36:41 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 936.119543] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 08:36:41 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9, 0x1, 0x81, 0x6, 0x0, 0x4, 0x40800, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x5, 0x5}, 0x164, 0x800, 0xfffffffb, 0x7, 0xb2b, 0x2, 0x20}, r3, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 936.162083] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:41 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 936.274128] device wlan1 left promiscuous mode [ 936.294339] device wlan1 entered promiscuous mode 08:36:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xdc, 0x5000000, 0x0) [ 936.315772] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 936.348327] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:41 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:41 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) getpgrp(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:41 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xd2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) [ 936.533541] device wlan1 left promiscuous mode [ 936.552207] device wlan1 entered promiscuous mode [ 936.570503] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 936.602031] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:42 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xea, 0x5000000, 0x0) 08:36:42 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1cd, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:42 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:42 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xd2, 0x5000000, 0x0) 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:42 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 936.908777] device wlan1 left promiscuous mode [ 936.936100] device wlan1 entered promiscuous mode [ 936.961365] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 936.993451] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:42 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 08:36:42 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 937.165468] device wlan1 left promiscuous mode 08:36:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1ce, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:42 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) 08:36:42 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:42 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:42 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:42 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:42 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 08:36:42 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:42 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 937.604062] device wlan1 entered promiscuous mode [ 937.610399] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 937.625840] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1cf, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) 08:36:43 executing program 4: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 4: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 4: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x84000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 938.220615] device wlan1 left promiscuous mode [ 938.244206] device wlan1 entered promiscuous mode [ 938.274013] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 938.293671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d1, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:43 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 938.420671] device wlan1 left promiscuous mode [ 938.434031] device wlan1 entered promiscuous mode [ 938.444005] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 938.454275] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:43 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0xe273ee81c008a067, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:43 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:43 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 938.657029] device wlan1 left promiscuous mode [ 938.697282] device wlan1 entered promiscuous mode [ 938.720781] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 938.746413] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:44 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:44 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 938.923277] device wlan1 left promiscuous mode 08:36:44 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:44 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 938.960017] device wlan1 entered promiscuous mode 08:36:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 1: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 939.011323] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 939.060170] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:44 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:44 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d3, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:44 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:44 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) 08:36:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:44 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:44 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d4, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:45 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xcf, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:45 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:45 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 0: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 939.835379] device wlan1 left promiscuous mode 08:36:45 executing program 2: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 939.864114] device wlan1 entered promiscuous mode [ 939.884204] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 08:36:45 executing program 0: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 939.933117] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:45 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:45 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 0: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:45 executing program 1: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0xc7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:45 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 0: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 2: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 1: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:45 executing program 0: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 1: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:45 executing program 2: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d6, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:46 executing program 5: socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 2: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 0: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 4 (fault-call:1 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 940.838334] FAULT_INJECTION: forcing a failure. [ 940.838334] name failslab, interval 1, probability 0, space 0, times 0 [ 940.859463] CPU: 1 PID: 19385 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 940.867377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.876736] Call Trace: [ 940.879331] dump_stack+0x1fc/0x2ef [ 940.883012] should_fail.cold+0xa/0xf 08:36:46 executing program 0: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 940.886834] ? setup_fault_attr+0x200/0x200 [ 940.891152] ? lock_acquire+0x170/0x3c0 [ 940.895140] __should_failslab+0x115/0x180 [ 940.899392] should_failslab+0x5/0x10 [ 940.903198] __kmalloc+0x2ab/0x3c0 [ 940.906745] ? sock_kmalloc+0xb5/0x100 [ 940.910646] sock_kmalloc+0xb5/0x100 [ 940.914374] __ipv6_sock_mc_join+0x472/0xa40 [ 940.918790] ? __might_fault+0x192/0x1d0 [ 940.922871] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 940.928416] ? ipv6_update_options+0x3a0/0x3a0 [ 940.933003] ? __lock_acquire+0x6de/0x3ff0 [ 940.937253] ? __lock_acquire+0x6de/0x3ff0 [ 940.941492] ? __might_fault+0x11f/0x1d0 [ 940.945554] ? _parse_integer+0x132/0x180 [ 940.949692] ? __lock_acquire+0x6de/0x3ff0 [ 940.953917] ? _copy_from_user+0xd2/0x130 [ 940.958051] ? aa_label_sk_perm+0xf1/0x510 [ 940.962269] ? mark_held_locks+0xf0/0xf0 [ 940.966385] ? aa_profile_af_perm+0x2e0/0x2e0 [ 940.970862] ? lock_downgrade+0x720/0x720 [ 940.975008] ? check_preemption_disabled+0x41/0x280 [ 940.980037] ? aa_sk_perm+0x534/0x930 [ 940.983823] ? aa_af_perm+0x230/0x230 [ 940.987610] ipv6_setsockopt+0xb9/0x160 [ 940.991572] udpv6_setsockopt+0x5d/0xa0 [ 940.995530] __sys_setsockopt+0x14d/0x240 [ 940.999671] ? kernel_accept+0x310/0x310 [ 941.003716] ? fput+0x2b/0x190 [ 941.006891] ? ksys_write+0x1c8/0x2a0 [ 941.010688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 941.016057] __x64_sys_setsockopt+0xba/0x150 [ 941.020461] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 941.025030] do_syscall_64+0xf9/0x620 [ 941.028821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.034092] RIP: 0033:0x466459 [ 941.037278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 941.056365] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 941.064060] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 941.071312] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 941.078564] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 08:36:46 executing program 2: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 941.085817] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 941.093068] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 08:36:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 5: socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:46 executing program 0: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 4 (fault-call:1 fault-nth:1): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 5: socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) [ 941.310069] FAULT_INJECTION: forcing a failure. [ 941.310069] name failslab, interval 1, probability 0, space 0, times 0 [ 941.343045] CPU: 0 PID: 19412 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 941.350969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:36:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 941.360329] Call Trace: [ 941.362933] dump_stack+0x1fc/0x2ef [ 941.366578] should_fail.cold+0xa/0xf [ 941.370398] ? setup_fault_attr+0x200/0x200 [ 941.374731] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 941.380628] ? deref_stack_reg+0x1d0/0x1d0 [ 941.384867] ? deref_stack_reg+0x1d0/0x1d0 [ 941.389199] ? check_preemption_disabled+0x41/0x280 [ 941.394224] __should_failslab+0x115/0x180 [ 941.398999] should_failslab+0x5/0x10 [ 941.402815] kmem_cache_alloc+0x3f/0x370 08:36:46 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) [ 941.406886] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 941.411998] dst_alloc+0x106/0x1a0 [ 941.415554] ip6_dst_alloc+0x2e/0x100 [ 941.419371] ip6_create_rt_rcu+0x235/0x510 [ 941.423617] ? ip6_dst_alloc+0x100/0x100 [ 941.427694] ip6_pol_route_lookup+0x9fe/0xe10 [ 941.432214] ? fib6_multipath_select+0x2c0/0x2c0 [ 941.436981] ? __ipv6_sock_mc_join+0x472/0xa40 [ 941.441572] ? do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 941.447282] ? ipv6_setsockopt+0xb9/0x160 [ 941.451416] ? udpv6_setsockopt+0x5d/0xa0 [ 941.455546] ? __sys_setsockopt+0x14d/0x240 [ 941.459916] ? do_syscall_64+0xf9/0x620 [ 941.463882] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.469232] fib6_rule_lookup+0x10b/0x4e0 [ 941.473365] ? fib6_multipath_select+0x2c0/0x2c0 [ 941.478103] ? fib6_lookup+0x300/0x300 [ 941.481986] ? mark_held_locks+0xf0/0xf0 [ 941.486042] ? mark_held_locks+0xf0/0xf0 [ 941.490088] ? should_fail+0x142/0x7b0 [ 941.493963] rt6_lookup+0x15f/0x220 [ 941.497591] ? ip6_pkt_prohibit_out+0x170/0x170 [ 941.502257] ? sock_kmalloc+0xb5/0x100 [ 941.506145] __ipv6_sock_mc_join+0x821/0xa40 [ 941.510549] ? __might_fault+0x192/0x1d0 [ 941.514598] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 941.520121] ? ipv6_update_options+0x3a0/0x3a0 [ 941.524688] ? __lock_acquire+0x6de/0x3ff0 [ 941.528907] ? __lock_acquire+0x6de/0x3ff0 [ 941.533148] ? __might_fault+0x11f/0x1d0 [ 941.537195] ? _parse_integer+0x132/0x180 [ 941.541327] ? __lock_acquire+0x6de/0x3ff0 [ 941.545552] ? _copy_from_user+0xd2/0x130 [ 941.549685] ? aa_label_sk_perm+0xf1/0x510 [ 941.553903] ? mark_held_locks+0xf0/0xf0 [ 941.557948] ? aa_profile_af_perm+0x2e0/0x2e0 [ 941.562423] ? lock_downgrade+0x720/0x720 [ 941.566554] ? check_preemption_disabled+0x41/0x280 [ 941.571565] ? aa_sk_perm+0x534/0x930 [ 941.575360] ? aa_af_perm+0x230/0x230 [ 941.579146] ipv6_setsockopt+0xb9/0x160 [ 941.583113] udpv6_setsockopt+0x5d/0xa0 [ 941.587082] __sys_setsockopt+0x14d/0x240 [ 941.591216] ? kernel_accept+0x310/0x310 [ 941.595260] ? fput+0x2b/0x190 [ 941.598441] ? ksys_write+0x1c8/0x2a0 [ 941.602228] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 941.607586] __x64_sys_setsockopt+0xba/0x150 [ 941.612003] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 941.616584] do_syscall_64+0xf9/0x620 [ 941.620375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.625546] RIP: 0033:0x466459 [ 941.628735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 941.647974] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 08:36:46 executing program 0: socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 941.655663] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 941.662918] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 941.670168] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 [ 941.677437] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 941.684705] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 08:36:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:47 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:47 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:47 executing program 4 (fault-call:1 fault-nth:2): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 941.888107] FAULT_INJECTION: forcing a failure. [ 941.888107] name failslab, interval 1, probability 0, space 0, times 0 [ 941.899804] CPU: 1 PID: 19432 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 941.907693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.917051] Call Trace: [ 941.919646] dump_stack+0x1fc/0x2ef [ 941.923284] should_fail.cold+0xa/0xf [ 941.927104] ? setup_fault_attr+0x200/0x200 [ 941.931433] ? __ipv6_dev_mc_inc+0x15f/0xa80 [ 941.935850] __should_failslab+0x115/0x180 [ 941.940321] should_failslab+0x5/0x10 [ 941.944126] kmem_cache_alloc_trace+0x46/0x380 [ 941.948722] __ipv6_dev_mc_inc+0x3d4/0xa80 [ 941.952973] __ipv6_sock_mc_join+0x63d/0xa40 [ 941.957388] ? __might_fault+0x192/0x1d0 [ 941.961457] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 941.967001] ? ipv6_update_options+0x3a0/0x3a0 [ 941.971593] ? __lock_acquire+0x6de/0x3ff0 [ 941.975834] ? __might_fault+0x11f/0x1d0 [ 941.979902] ? _parse_integer+0x132/0x180 [ 941.984062] ? __lock_acquire+0x6de/0x3ff0 [ 941.988309] ? _copy_from_user+0xd2/0x130 [ 941.992462] ? aa_label_sk_perm+0xf1/0x510 [ 941.996700] ? mark_held_locks+0xf0/0xf0 [ 942.000776] ? aa_profile_af_perm+0x2e0/0x2e0 [ 942.005276] ? lock_downgrade+0x720/0x720 [ 942.009429] ? check_preemption_disabled+0x41/0x280 [ 942.014474] ? aa_sk_perm+0x534/0x930 [ 942.018277] ? aa_af_perm+0x230/0x230 [ 942.022083] ipv6_setsockopt+0xb9/0x160 [ 942.026066] udpv6_setsockopt+0x5d/0xa0 [ 942.030047] __sys_setsockopt+0x14d/0x240 [ 942.034200] ? kernel_accept+0x310/0x310 [ 942.038263] ? fput+0x2b/0x190 [ 942.041456] ? ksys_write+0x1c8/0x2a0 [ 942.045266] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.050638] __x64_sys_setsockopt+0xba/0x150 [ 942.055053] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 942.059986] do_syscall_64+0xf9/0x620 [ 942.063794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.068983] RIP: 0033:0x466459 [ 942.072176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.091071] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 942.098865] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 942.106131] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 942.113400] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 [ 942.120668] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 942.127936] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 08:36:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d8, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:47 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:47 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:47 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:47 executing program 4 (fault-call:1 fault-nth:3): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:47 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 942.243013] FAULT_INJECTION: forcing a failure. [ 942.243013] name failslab, interval 1, probability 0, space 0, times 0 [ 942.262057] CPU: 0 PID: 19441 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 942.269960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.279343] Call Trace: [ 942.282444] dump_stack+0x1fc/0x2ef [ 942.286085] should_fail.cold+0xa/0xf 08:36:47 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 942.289895] ? setup_fault_attr+0x200/0x200 [ 942.294319] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 942.300218] ? check_preemption_disabled+0x41/0x280 [ 942.305681] __should_failslab+0x115/0x180 [ 942.309930] should_failslab+0x5/0x10 [ 942.313747] kmem_cache_alloc+0x3f/0x370 [ 942.317816] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 942.322963] dst_alloc+0x106/0x1a0 [ 942.326520] ip6_dst_alloc+0x2e/0x100 [ 942.330332] ip6_create_rt_rcu+0x235/0x510 [ 942.334580] ? ip6_dst_alloc+0x100/0x100 [ 942.338662] ip6_pol_route_lookup+0x9fe/0xe10 08:36:47 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) [ 942.343176] ? fib6_multipath_select+0x2c0/0x2c0 [ 942.347950] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 942.353068] fib6_rule_lookup+0x10b/0x4e0 [ 942.357224] ? fib6_multipath_select+0x2c0/0x2c0 [ 942.361988] ? fib6_lookup+0x300/0x300 [ 942.365890] ? round_jiffies_up_relative+0xd0/0xd0 [ 942.370834] ? mark_held_locks+0xf0/0xf0 [ 942.374920] rt6_lookup+0x15f/0x220 [ 942.378561] ? ip6_pkt_prohibit_out+0x170/0x170 [ 942.383233] ? lock_acquire+0x170/0x3c0 [ 942.387194] ? ip6_mc_source+0x132/0x15b0 [ 942.391332] ip6_mc_find_dev_rcu+0x3d/0x210 [ 942.395637] ip6_mc_source+0x1ce/0x15b0 [ 942.399647] ? __ipv6_sock_mc_join+0x6c4/0xa40 [ 942.404228] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 942.409749] ? ipv6_update_options+0x3a0/0x3a0 [ 942.414316] ? __lock_acquire+0x6de/0x3ff0 [ 942.418550] ? __might_fault+0x11f/0x1d0 [ 942.422609] ? _parse_integer+0x132/0x180 [ 942.426744] ? __lock_acquire+0x6de/0x3ff0 [ 942.430987] ? _copy_from_user+0xd2/0x130 [ 942.435130] ? aa_label_sk_perm+0xf1/0x510 [ 942.439357] ? mark_held_locks+0xf0/0xf0 [ 942.443402] ? aa_profile_af_perm+0x2e0/0x2e0 [ 942.447971] ? lock_downgrade+0x720/0x720 [ 942.452120] ? check_preemption_disabled+0x41/0x280 [ 942.457145] ? aa_sk_perm+0x534/0x930 [ 942.460943] ? aa_af_perm+0x230/0x230 [ 942.464764] ipv6_setsockopt+0xb9/0x160 [ 942.468735] udpv6_setsockopt+0x5d/0xa0 [ 942.472706] __sys_setsockopt+0x14d/0x240 [ 942.477532] ? kernel_accept+0x310/0x310 [ 942.481580] ? fput+0x2b/0x190 [ 942.484755] ? ksys_write+0x1c8/0x2a0 [ 942.488556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.493923] __x64_sys_setsockopt+0xba/0x150 [ 942.498318] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 942.502883] do_syscall_64+0xf9/0x620 [ 942.506671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.511844] RIP: 0033:0x466459 [ 942.515020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.533900] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 08:36:47 executing program 2 (fault-call:1 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 942.541599] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 942.548866] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 942.556125] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 [ 942.563811] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 942.571066] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 08:36:47 executing program 1 (fault-call:1 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:47 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 942.721057] FAULT_INJECTION: forcing a failure. [ 942.721057] name failslab, interval 1, probability 0, space 0, times 0 [ 942.737925] CPU: 1 PID: 19457 Comm: syz-executor.2 Not tainted 4.19.185-syzkaller #0 [ 942.745824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.755175] Call Trace: [ 942.757771] dump_stack+0x1fc/0x2ef [ 942.761409] should_fail.cold+0xa/0xf [ 942.765221] ? setup_fault_attr+0x200/0x200 [ 942.769549] ? lock_acquire+0x170/0x3c0 [ 942.773532] __should_failslab+0x115/0x180 [ 942.777771] should_failslab+0x5/0x10 [ 942.781572] __kmalloc+0x2ab/0x3c0 [ 942.785111] ? sock_kmalloc+0xb5/0x100 [ 942.789008] sock_kmalloc+0xb5/0x100 [ 942.792735] __ipv6_sock_mc_join+0x472/0xa40 [ 942.797148] ? __might_fault+0x192/0x1d0 [ 942.801218] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 942.806766] ? ipv6_update_options+0x3a0/0x3a0 [ 942.811352] ? __lock_acquire+0x6de/0x3ff0 [ 942.815595] ? __lock_acquire+0x6de/0x3ff0 [ 942.819848] ? __might_fault+0x11f/0x1d0 [ 942.823922] ? _parse_integer+0x132/0x180 [ 942.828082] ? __lock_acquire+0x6de/0x3ff0 [ 942.832328] ? _copy_from_user+0xd2/0x130 [ 942.836483] ? aa_label_sk_perm+0xf1/0x510 [ 942.840721] ? mark_held_locks+0xf0/0xf0 [ 942.845308] ? aa_profile_af_perm+0x2e0/0x2e0 [ 942.849807] ? lock_downgrade+0x720/0x720 [ 942.853964] ? check_preemption_disabled+0x41/0x280 [ 942.859013] ? aa_sk_perm+0x534/0x930 [ 942.862827] ? aa_af_perm+0x230/0x230 [ 942.866759] ipv6_setsockopt+0xb9/0x160 [ 942.870741] udpv6_setsockopt+0x5d/0xa0 [ 942.874725] __sys_setsockopt+0x14d/0x240 [ 942.878879] ? kernel_accept+0x310/0x310 [ 942.882943] ? fput+0x2b/0x190 [ 942.886143] ? ksys_write+0x1c8/0x2a0 [ 942.889950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.895319] __x64_sys_setsockopt+0xba/0x150 [ 942.899738] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 942.904322] do_syscall_64+0xf9/0x620 [ 942.908139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.913325] RIP: 0033:0x466459 [ 942.916520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.935420] RSP: 002b:00007f2be175d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 942.943136] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 942.950492] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 942.957759] RBP: 00007f2be175d1d0 R08: 0000000000000108 R09: 0000000000000000 [ 942.965070] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 942.972338] R13: 00007ffe6fe6a11f R14: 00007f2be175d300 R15: 0000000000022000 [ 942.995530] FAULT_INJECTION: forcing a failure. [ 942.995530] name failslab, interval 1, probability 0, space 0, times 0 [ 943.043421] CPU: 1 PID: 19458 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 943.051327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.060678] Call Trace: [ 943.063276] dump_stack+0x1fc/0x2ef [ 943.066916] should_fail.cold+0xa/0xf [ 943.070724] ? setup_fault_attr+0x200/0x200 [ 943.075048] ? lock_acquire+0x170/0x3c0 [ 943.080688] __should_failslab+0x115/0x180 [ 943.084953] should_failslab+0x5/0x10 [ 943.088759] __kmalloc+0x2ab/0x3c0 [ 943.092296] ? sock_kmalloc+0xb5/0x100 [ 943.096168] sock_kmalloc+0xb5/0x100 [ 943.099870] __ipv6_sock_mc_join+0x472/0xa40 [ 943.104298] ? __might_fault+0x192/0x1d0 [ 943.108382] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 943.113907] ? ipv6_update_options+0x3a0/0x3a0 [ 943.118497] ? __lock_acquire+0x6de/0x3ff0 [ 943.122732] ? __lock_acquire+0x6de/0x3ff0 [ 943.128863] ? __might_fault+0x11f/0x1d0 [ 943.132993] ? _parse_integer+0x132/0x180 [ 943.137214] ? __lock_acquire+0x6de/0x3ff0 [ 943.141433] ? _copy_from_user+0xd2/0x130 [ 943.145622] ? aa_label_sk_perm+0xf1/0x510 [ 943.149847] ? mark_held_locks+0xf0/0xf0 [ 943.153891] ? aa_profile_af_perm+0x2e0/0x2e0 [ 943.158474] ? lock_downgrade+0x720/0x720 [ 943.162630] ? check_preemption_disabled+0x41/0x280 [ 943.167664] ? aa_sk_perm+0x534/0x930 [ 943.171493] ? aa_af_perm+0x230/0x230 [ 943.175284] ipv6_setsockopt+0xb9/0x160 [ 943.179246] udpv6_setsockopt+0x5d/0xa0 [ 943.183207] __sys_setsockopt+0x14d/0x240 [ 943.187338] ? kernel_accept+0x310/0x310 [ 943.191384] ? fput+0x2b/0x190 [ 943.194568] ? ksys_write+0x1c8/0x2a0 [ 943.198355] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.203704] __x64_sys_setsockopt+0xba/0x150 [ 943.208154] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 943.212718] do_syscall_64+0xf9/0x620 [ 943.216502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.221679] RIP: 0033:0x466459 [ 943.224864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.243744] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 943.251432] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.258683] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 943.265934] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 943.273195] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 943.280448] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 08:36:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1d9, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:48 executing program 4 (fault-call:1 fault-nth:4): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:48 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:48 executing program 2 (fault-call:1 fault-nth:1): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:48 executing program 1 (fault-call:1 fault-nth:1): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:48 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 943.363004] device wlan1 left promiscuous mode 08:36:48 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 943.397460] FAULT_INJECTION: forcing a failure. [ 943.397460] name failslab, interval 1, probability 0, space 0, times 0 [ 943.409135] CPU: 1 PID: 19470 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 943.417027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.426383] Call Trace: [ 943.428986] dump_stack+0x1fc/0x2ef [ 943.432633] should_fail.cold+0xa/0xf [ 943.436446] ? setup_fault_attr+0x200/0x200 [ 943.440773] ? mark_held_locks+0xa6/0xf0 [ 943.444832] __should_failslab+0x115/0x180 [ 943.449057] should_failslab+0x5/0x10 [ 943.452855] __kmalloc+0x6d/0x3c0 [ 943.456304] ? sock_kmalloc+0xb5/0x100 [ 943.460199] sock_kmalloc+0xb5/0x100 [ 943.463913] ip6_mc_source+0x11c7/0x15b0 [ 943.467983] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 943.473697] ? ipv6_update_options+0x3a0/0x3a0 [ 943.478263] ? __lock_acquire+0x6de/0x3ff0 [ 943.482482] ? __lock_acquire+0x6de/0x3ff0 [ 943.486716] ? __might_fault+0x11f/0x1d0 [ 943.490795] ? _parse_integer+0x132/0x180 [ 943.494930] ? __lock_acquire+0x6de/0x3ff0 [ 943.499433] ? _copy_from_user+0xd2/0x130 [ 943.503581] ? aa_label_sk_perm+0xf1/0x510 [ 943.507797] ? mark_held_locks+0xf0/0xf0 [ 943.511843] ? aa_profile_af_perm+0x2e0/0x2e0 [ 943.516334] ? lock_downgrade+0x720/0x720 [ 943.520497] ? check_preemption_disabled+0x41/0x280 [ 943.525546] ? aa_sk_perm+0x534/0x930 [ 943.529369] ? aa_af_perm+0x230/0x230 [ 943.533177] ipv6_setsockopt+0xb9/0x160 [ 943.537156] udpv6_setsockopt+0x5d/0xa0 [ 943.541136] __sys_setsockopt+0x14d/0x240 [ 943.545289] ? kernel_accept+0x310/0x310 [ 943.549356] ? fput+0x2b/0x190 [ 943.552543] ? ksys_write+0x1c8/0x2a0 [ 943.556329] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.561678] __x64_sys_setsockopt+0xba/0x150 [ 943.566077] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 943.570643] do_syscall_64+0xf9/0x620 [ 943.574439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.579619] RIP: 0033:0x466459 [ 943.582807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.601691] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 943.611041] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.618325] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 943.625589] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 [ 943.632875] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 943.640128] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 [ 943.651639] FAULT_INJECTION: forcing a failure. [ 943.651639] name failslab, interval 1, probability 0, space 0, times 0 [ 943.666860] CPU: 1 PID: 19473 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 943.674780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.684122] Call Trace: [ 943.686714] dump_stack+0x1fc/0x2ef [ 943.690344] should_fail.cold+0xa/0xf [ 943.694159] ? setup_fault_attr+0x200/0x200 [ 943.698480] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 943.704365] ? deref_stack_reg+0x1d0/0x1d0 [ 943.708614] ? deref_stack_reg+0x1d0/0x1d0 [ 943.712846] ? check_preemption_disabled+0x41/0x280 [ 943.717866] __should_failslab+0x115/0x180 [ 943.722109] should_failslab+0x5/0x10 [ 943.725962] kmem_cache_alloc+0x3f/0x370 [ 943.730019] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 943.735226] dst_alloc+0x106/0x1a0 [ 943.738768] ip6_dst_alloc+0x2e/0x100 [ 943.742577] ip6_create_rt_rcu+0x235/0x510 [ 943.746806] ? ip6_dst_alloc+0x100/0x100 [ 943.750855] ip6_pol_route_lookup+0x9fe/0xe10 [ 943.755353] ? fib6_multipath_select+0x2c0/0x2c0 [ 943.760119] ? __ipv6_sock_mc_join+0x472/0xa40 [ 943.764690] ? do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 943.770383] ? ipv6_setsockopt+0xb9/0x160 [ 943.774523] ? udpv6_setsockopt+0x5d/0xa0 [ 943.778669] ? __sys_setsockopt+0x14d/0x240 [ 943.782984] ? do_syscall_64+0xf9/0x620 [ 943.786944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.792300] fib6_rule_lookup+0x10b/0x4e0 [ 943.796448] ? fib6_multipath_select+0x2c0/0x2c0 [ 943.801191] ? fib6_lookup+0x300/0x300 [ 943.805076] ? mark_held_locks+0xf0/0xf0 [ 943.809136] ? mark_held_locks+0xf0/0xf0 [ 943.813181] ? should_fail+0x142/0x7b0 [ 943.817053] rt6_lookup+0x15f/0x220 [ 943.820665] ? ip6_pkt_prohibit_out+0x170/0x170 [ 943.825343] ? sock_kmalloc+0xb5/0x100 [ 943.829222] __ipv6_sock_mc_join+0x821/0xa40 [ 943.833619] ? __might_fault+0x192/0x1d0 [ 943.837679] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 943.843229] ? ipv6_update_options+0x3a0/0x3a0 [ 943.847894] ? __lock_acquire+0x6de/0x3ff0 [ 943.852142] ? __lock_acquire+0x6de/0x3ff0 [ 943.856426] ? __might_fault+0x11f/0x1d0 [ 943.860521] ? _parse_integer+0x132/0x180 [ 943.864715] ? __lock_acquire+0x6de/0x3ff0 [ 943.869073] ? _copy_from_user+0xd2/0x130 [ 943.873264] ? aa_label_sk_perm+0xf1/0x510 [ 943.877495] ? mark_held_locks+0xf0/0xf0 [ 943.881540] ? aa_profile_af_perm+0x2e0/0x2e0 [ 943.886025] ? lock_downgrade+0x720/0x720 [ 943.890182] ? check_preemption_disabled+0x41/0x280 [ 943.895219] ? aa_sk_perm+0x534/0x930 [ 943.899022] ? aa_af_perm+0x230/0x230 [ 943.902825] ipv6_setsockopt+0xb9/0x160 [ 943.906823] udpv6_setsockopt+0x5d/0xa0 [ 943.910898] __sys_setsockopt+0x14d/0x240 [ 943.915104] ? kernel_accept+0x310/0x310 [ 943.919193] ? fput+0x2b/0x190 [ 943.922382] ? ksys_write+0x1c8/0x2a0 [ 943.926222] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.931615] __x64_sys_setsockopt+0xba/0x150 [ 943.936018] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 943.940608] do_syscall_64+0xf9/0x620 [ 943.944407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.949578] RIP: 0033:0x466459 [ 943.952759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.971660] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 943.979459] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 943.986726] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 943.993977] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 944.001231] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 944.008484] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 [ 944.036868] FAULT_INJECTION: forcing a failure. [ 944.036868] name failslab, interval 1, probability 0, space 0, times 0 08:36:49 executing program 1 (fault-call:1 fault-nth:2): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 944.053487] CPU: 1 PID: 19471 Comm: syz-executor.2 Not tainted 4.19.185-syzkaller #0 [ 944.061385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.070742] Call Trace: [ 944.073428] dump_stack+0x1fc/0x2ef [ 944.077077] should_fail.cold+0xa/0xf [ 944.080889] ? setup_fault_attr+0x200/0x200 [ 944.085232] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 944.091129] ? deref_stack_reg+0x1d0/0x1d0 [ 944.095372] ? deref_stack_reg+0x1d0/0x1d0 [ 944.099618] ? check_preemption_disabled+0x41/0x280 [ 944.104904] __should_failslab+0x115/0x180 [ 944.109151] should_failslab+0x5/0x10 [ 944.112955] kmem_cache_alloc+0x3f/0x370 [ 944.117025] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 944.122137] dst_alloc+0x106/0x1a0 [ 944.125681] ip6_dst_alloc+0x2e/0x100 [ 944.129486] ip6_create_rt_rcu+0x235/0x510 [ 944.135282] ? ip6_dst_alloc+0x100/0x100 [ 944.139384] ip6_pol_route_lookup+0x9fe/0xe10 [ 944.143916] ? fib6_multipath_select+0x2c0/0x2c0 [ 944.148667] ? __ipv6_sock_mc_join+0x472/0xa40 [ 944.153234] ? do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 944.158926] ? ipv6_setsockopt+0xb9/0x160 [ 944.163056] ? udpv6_setsockopt+0x5d/0xa0 [ 944.167202] ? __sys_setsockopt+0x14d/0x240 [ 944.171792] ? do_syscall_64+0xf9/0x620 [ 944.175770] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.181175] fib6_rule_lookup+0x10b/0x4e0 [ 944.185319] ? fib6_multipath_select+0x2c0/0x2c0 [ 944.190057] ? fib6_lookup+0x300/0x300 [ 944.193942] ? mark_held_locks+0xf0/0xf0 [ 944.197998] ? mark_held_locks+0xf0/0xf0 [ 944.202046] ? should_fail+0x142/0x7b0 [ 944.205920] rt6_lookup+0x15f/0x220 [ 944.210055] ? ip6_pkt_prohibit_out+0x170/0x170 [ 944.214715] ? sock_kmalloc+0xb5/0x100 [ 944.218591] __ipv6_sock_mc_join+0x821/0xa40 [ 944.222984] ? __might_fault+0x192/0x1d0 [ 944.227035] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 944.232560] ? ipv6_update_options+0x3a0/0x3a0 [ 944.237141] ? __lock_acquire+0x6de/0x3ff0 [ 944.241374] ? __lock_acquire+0x6de/0x3ff0 [ 944.245596] ? __might_fault+0x11f/0x1d0 [ 944.253473] ? _parse_integer+0x132/0x180 [ 944.257610] ? __lock_acquire+0x6de/0x3ff0 [ 944.261846] ? _copy_from_user+0xd2/0x130 [ 944.265982] ? aa_label_sk_perm+0xf1/0x510 [ 944.270240] ? mark_held_locks+0xf0/0xf0 [ 944.274296] ? aa_profile_af_perm+0x2e0/0x2e0 [ 944.278773] ? lock_downgrade+0x720/0x720 [ 944.282906] ? check_preemption_disabled+0x41/0x280 [ 944.287916] ? aa_sk_perm+0x534/0x930 [ 944.291714] ? aa_af_perm+0x230/0x230 [ 944.295503] ipv6_setsockopt+0xb9/0x160 [ 944.299469] udpv6_setsockopt+0x5d/0xa0 [ 944.303530] __sys_setsockopt+0x14d/0x240 [ 944.307686] ? kernel_accept+0x310/0x310 [ 944.311736] ? fput+0x2b/0x190 [ 944.314911] ? ksys_write+0x1c8/0x2a0 [ 944.318696] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 944.324045] __x64_sys_setsockopt+0xba/0x150 [ 944.328445] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 944.333011] do_syscall_64+0xf9/0x620 [ 944.336798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.342002] RIP: 0033:0x466459 [ 944.345177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 944.364060] RSP: 002b:00007f2be175d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 944.371837] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 944.379185] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 944.386455] RBP: 00007f2be175d1d0 R08: 0000000000000108 R09: 0000000000000000 [ 944.393714] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 944.401051] R13: 00007ffe6fe6a11f R14: 00007f2be175d300 R15: 0000000000022000 [ 944.446694] FAULT_INJECTION: forcing a failure. [ 944.446694] name failslab, interval 1, probability 0, space 0, times 0 [ 944.458106] CPU: 0 PID: 19482 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 944.465992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.476301] Call Trace: [ 944.478899] dump_stack+0x1fc/0x2ef [ 944.482543] should_fail.cold+0xa/0xf [ 944.486378] ? setup_fault_attr+0x200/0x200 [ 944.490711] ? __ipv6_dev_mc_inc+0x15f/0xa80 [ 944.495133] __should_failslab+0x115/0x180 [ 944.499381] should_failslab+0x5/0x10 [ 944.503195] kmem_cache_alloc_trace+0x46/0x380 [ 944.508488] __ipv6_dev_mc_inc+0x3d4/0xa80 [ 944.512742] __ipv6_sock_mc_join+0x63d/0xa40 [ 944.517165] ? __might_fault+0x192/0x1d0 [ 944.521245] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 944.526793] ? ipv6_update_options+0x3a0/0x3a0 [ 944.531385] ? __lock_acquire+0x6de/0x3ff0 [ 944.535654] ? __lock_acquire+0x6de/0x3ff0 [ 944.539899] ? __might_fault+0x11f/0x1d0 08:36:49 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) 08:36:49 executing program 4 (fault-call:1 fault-nth:5): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1da, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:49 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:49 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 944.543970] ? _parse_integer+0x132/0x180 [ 944.548133] ? __lock_acquire+0x6de/0x3ff0 [ 944.552380] ? _copy_from_user+0xd2/0x130 [ 944.556542] ? aa_label_sk_perm+0xf1/0x510 [ 944.560785] ? mark_held_locks+0xf0/0xf0 [ 944.564859] ? aa_profile_af_perm+0x2e0/0x2e0 [ 944.569362] ? lock_downgrade+0x720/0x720 [ 944.573523] ? check_preemption_disabled+0x41/0x280 [ 944.578577] ? aa_sk_perm+0x534/0x930 [ 944.582382] ? aa_af_perm+0x230/0x230 [ 944.586195] ipv6_setsockopt+0xb9/0x160 [ 944.590183] udpv6_setsockopt+0x5d/0xa0 [ 944.594169] __sys_setsockopt+0x14d/0x240 [ 944.598331] ? kernel_accept+0x310/0x310 [ 944.602398] ? fput+0x2b/0x190 [ 944.605600] ? ksys_write+0x1c8/0x2a0 [ 944.609415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 944.614793] __x64_sys_setsockopt+0xba/0x150 [ 944.619214] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 944.623804] do_syscall_64+0xf9/0x620 [ 944.627616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.632807] RIP: 0033:0x466459 [ 944.636008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 944.654903] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 944.662627] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 944.669895] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 944.677173] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 944.684446] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 944.691717] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 [ 944.718427] FAULT_INJECTION: forcing a failure. [ 944.718427] name failslab, interval 1, probability 0, space 0, times 0 [ 944.730101] CPU: 1 PID: 19490 Comm: syz-executor.4 Not tainted 4.19.185-syzkaller #0 [ 944.737994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.747462] Call Trace: [ 944.750064] dump_stack+0x1fc/0x2ef [ 944.753708] should_fail.cold+0xa/0xf [ 944.757521] ? setup_fault_attr+0x200/0x200 [ 944.761866] __should_failslab+0x115/0x180 08:36:50 executing program 1 (fault-call:1 fault-nth:3): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:50 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 944.766111] should_failslab+0x5/0x10 [ 944.769920] kmem_cache_alloc_trace+0x46/0x380 [ 944.774520] ip6_mc_add_src+0x6a4/0x9d0 [ 944.778507] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 944.783554] ip6_mc_source+0xec9/0x15b0 [ 944.787559] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 944.793113] ? ipv6_update_options+0x3a0/0x3a0 [ 944.797802] ? __lock_acquire+0x6de/0x3ff0 [ 944.802052] ? __lock_acquire+0x6de/0x3ff0 [ 944.806334] ? __might_fault+0x11f/0x1d0 [ 944.810399] ? _parse_integer+0x132/0x180 [ 944.814538] ? __lock_acquire+0x6de/0x3ff0 [ 944.818761] ? _copy_from_user+0xd2/0x130 [ 944.822894] ? aa_label_sk_perm+0xf1/0x510 [ 944.827144] ? mark_held_locks+0xf0/0xf0 [ 944.831220] ? aa_profile_af_perm+0x2e0/0x2e0 [ 944.835710] ? lock_downgrade+0x720/0x720 [ 944.839844] ? check_preemption_disabled+0x41/0x280 [ 944.844879] ? aa_sk_perm+0x534/0x930 [ 944.848686] ? aa_af_perm+0x230/0x230 [ 944.852500] ipv6_setsockopt+0xb9/0x160 [ 944.856470] udpv6_setsockopt+0x5d/0xa0 [ 944.860467] __sys_setsockopt+0x14d/0x240 [ 944.864616] ? kernel_accept+0x310/0x310 [ 944.868668] ? fput+0x2b/0x190 [ 944.871845] ? ksys_write+0x1c8/0x2a0 [ 944.875689] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 944.881063] __x64_sys_setsockopt+0xba/0x150 [ 944.885467] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 944.890048] do_syscall_64+0xf9/0x620 [ 944.893886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.899067] RIP: 0033:0x466459 08:36:50 executing program 0 (fault-call:1 fault-nth:0): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x11, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 944.902261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 944.922669] RSP: 002b:00007f353c456188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 944.930360] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 944.937610] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 944.944860] RBP: 00007f353c4561d0 R08: 0000000000000108 R09: 0000000000000000 [ 944.952124] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 944.959391] R13: 00007ffe1bdbd3bf R14: 00007f353c456300 R15: 0000000000022000 [ 945.018554] FAULT_INJECTION: forcing a failure. [ 945.018554] name failslab, interval 1, probability 0, space 0, times 0 [ 945.035895] CPU: 0 PID: 19499 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 945.043801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.053159] Call Trace: [ 945.055764] dump_stack+0x1fc/0x2ef [ 945.059417] should_fail.cold+0xa/0xf [ 945.063239] ? setup_fault_attr+0x200/0x200 08:36:50 executing program 4 (fault-call:1 fault-nth:6): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1db, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:50 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 945.067576] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 945.073474] ? check_preemption_disabled+0x41/0x280 [ 945.078490] __should_failslab+0x115/0x180 [ 945.082725] should_failslab+0x5/0x10 [ 945.086532] kmem_cache_alloc+0x3f/0x370 [ 945.090608] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 945.095721] dst_alloc+0x106/0x1a0 [ 945.099278] ip6_dst_alloc+0x2e/0x100 [ 945.103216] ip6_create_rt_rcu+0x235/0x510 [ 945.107462] ? ip6_dst_alloc+0x100/0x100 [ 945.111548] ip6_pol_route_lookup+0x9fe/0xe10 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x88, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.116076] ? fib6_multipath_select+0x2c0/0x2c0 [ 945.120850] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 945.125969] fib6_rule_lookup+0x10b/0x4e0 [ 945.130145] ? fib6_multipath_select+0x2c0/0x2c0 [ 945.134908] ? fib6_lookup+0x300/0x300 [ 945.138807] ? round_jiffies_up_relative+0xd0/0xd0 [ 945.143749] ? mark_held_locks+0xf0/0xf0 [ 945.147827] rt6_lookup+0x15f/0x220 [ 945.151472] ? ip6_pkt_prohibit_out+0x170/0x170 [ 945.156162] ? lock_acquire+0x170/0x3c0 [ 945.160144] ? ip6_mc_source+0x132/0x15b0 [ 945.164310] ip6_mc_find_dev_rcu+0x3d/0x210 [ 945.168642] ip6_mc_source+0x1ce/0x15b0 [ 945.172625] ? __ipv6_sock_mc_join+0x6c4/0xa40 [ 945.177225] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 945.182779] ? ipv6_update_options+0x3a0/0x3a0 [ 945.187391] ? __lock_acquire+0x6de/0x3ff0 [ 945.191639] ? __lock_acquire+0x6de/0x3ff0 [ 945.195886] ? __might_fault+0x11f/0x1d0 [ 945.199955] ? _parse_integer+0x132/0x180 [ 945.204116] ? __lock_acquire+0x6de/0x3ff0 [ 945.208370] ? _copy_from_user+0xd2/0x130 [ 945.212529] ? aa_label_sk_perm+0xf1/0x510 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.216776] ? mark_held_locks+0xf0/0xf0 [ 945.220848] ? aa_profile_af_perm+0x2e0/0x2e0 [ 945.225354] ? lock_downgrade+0x720/0x720 [ 945.229515] ? check_preemption_disabled+0x41/0x280 [ 945.234562] ? aa_sk_perm+0x534/0x930 [ 945.238377] ? aa_af_perm+0x230/0x230 [ 945.242187] ipv6_setsockopt+0xb9/0x160 [ 945.246171] udpv6_setsockopt+0x5d/0xa0 [ 945.250333] __sys_setsockopt+0x14d/0x240 [ 945.254506] ? kernel_accept+0x310/0x310 [ 945.258581] ? fput+0x2b/0x190 [ 945.261787] ? ksys_write+0x1c8/0x2a0 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.265601] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 945.270966] __x64_sys_setsockopt+0xba/0x150 [ 945.275375] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 945.279955] do_syscall_64+0xf9/0x620 [ 945.283776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.288968] RIP: 0033:0x466459 [ 945.292167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.311074] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.318797] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 945.326420] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 945.333697] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 945.340968] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 945.348238] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 [ 945.393606] FAULT_INJECTION: forcing a failure. [ 945.393606] name failslab, interval 1, probability 0, space 0, times 0 [ 945.410896] CPU: 1 PID: 19504 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 945.418798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.428581] Call Trace: [ 945.431182] dump_stack+0x1fc/0x2ef [ 945.434811] should_fail.cold+0xa/0xf [ 945.438600] ? setup_fault_attr+0x200/0x200 [ 945.442918] ? lock_acquire+0x170/0x3c0 [ 945.446892] __should_failslab+0x115/0x180 [ 945.451109] should_failslab+0x5/0x10 [ 945.454892] __kmalloc+0x2ab/0x3c0 [ 945.458432] ? sock_kmalloc+0xb5/0x100 [ 945.462309] sock_kmalloc+0xb5/0x100 [ 945.466010] __ipv6_sock_mc_join+0x472/0xa40 [ 945.470408] ? __might_fault+0x192/0x1d0 [ 945.474455] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 945.479976] ? ipv6_update_options+0x3a0/0x3a0 [ 945.485210] ? __lock_acquire+0x6de/0x3ff0 [ 945.489428] ? __lock_acquire+0x6de/0x3ff0 [ 945.493647] ? __might_fault+0x11f/0x1d0 [ 945.497695] ? _parse_integer+0x132/0x180 [ 945.501828] ? __lock_acquire+0x6de/0x3ff0 [ 945.506046] ? _copy_from_user+0xd2/0x130 [ 945.510197] ? aa_label_sk_perm+0xf1/0x510 [ 945.514415] ? mark_held_locks+0xf0/0xf0 [ 945.519758] ? aa_profile_af_perm+0x2e0/0x2e0 [ 945.524248] ? lock_downgrade+0x720/0x720 [ 945.528380] ? check_preemption_disabled+0x41/0x280 [ 945.533404] ? aa_sk_perm+0x534/0x930 [ 945.537187] ? aa_af_perm+0x230/0x230 [ 945.540973] ipv6_setsockopt+0xb9/0x160 [ 945.544933] udpv6_setsockopt+0x5d/0xa0 [ 945.548892] __sys_setsockopt+0x14d/0x240 [ 945.553297] ? kernel_accept+0x310/0x310 [ 945.557948] ? fput+0x2b/0x190 [ 945.561123] ? ksys_write+0x1c8/0x2a0 [ 945.564913] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 945.570275] __x64_sys_setsockopt+0xba/0x150 [ 945.575275] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 945.579838] do_syscall_64+0xf9/0x620 [ 945.583637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.588922] RIP: 0033:0x466459 [ 945.592096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.611066] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 945.618755] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 945.626960] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 945.634225] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 08:36:50 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.641482] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 945.648746] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 08:36:51 executing program 1 (fault-call:1 fault-nth:4): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 0 (fault-call:1 fault-nth:1): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1dc, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.765420] FAULT_INJECTION: forcing a failure. [ 945.765420] name failslab, interval 1, probability 0, space 0, times 0 [ 945.776772] CPU: 1 PID: 19526 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 945.784657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.794021] Call Trace: [ 945.796623] dump_stack+0x1fc/0x2ef [ 945.800265] should_fail.cold+0xa/0xf [ 945.804166] ? setup_fault_attr+0x200/0x200 [ 945.808534] ? mark_held_locks+0xa6/0xf0 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.812633] __should_failslab+0x115/0x180 [ 945.816878] should_failslab+0x5/0x10 [ 945.820688] __kmalloc+0x6d/0x3c0 [ 945.824150] ? sock_kmalloc+0xb5/0x100 [ 945.828059] sock_kmalloc+0xb5/0x100 [ 945.832420] ip6_mc_source+0x11c7/0x15b0 [ 945.836976] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 945.842541] ? ipv6_update_options+0x3a0/0x3a0 [ 945.847135] ? __lock_acquire+0x6de/0x3ff0 [ 945.851487] ? __lock_acquire+0x6de/0x3ff0 [ 945.856178] ? __might_fault+0x11f/0x1d0 [ 945.860257] ? _parse_integer+0x132/0x180 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.864423] ? __lock_acquire+0x6de/0x3ff0 [ 945.868677] ? _copy_from_user+0xd2/0x130 [ 945.872852] ? aa_label_sk_perm+0xf1/0x510 [ 945.877101] ? mark_held_locks+0xf0/0xf0 [ 945.881176] ? aa_profile_af_perm+0x2e0/0x2e0 [ 945.885677] ? lock_downgrade+0x720/0x720 [ 945.889837] ? check_preemption_disabled+0x41/0x280 [ 945.894891] ? aa_sk_perm+0x534/0x930 [ 945.898706] ? aa_af_perm+0x230/0x230 [ 945.902517] ipv6_setsockopt+0xb9/0x160 [ 945.906503] udpv6_setsockopt+0x5d/0xa0 [ 945.910491] __sys_setsockopt+0x14d/0x240 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.914655] ? kernel_accept+0x310/0x310 [ 945.918837] ? fput+0x2b/0x190 [ 945.922040] ? ksys_write+0x1c8/0x2a0 [ 945.925863] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 945.931238] __x64_sys_setsockopt+0xba/0x150 [ 945.935663] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 945.940356] do_syscall_64+0xf9/0x620 [ 945.944177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.949372] RIP: 0033:0x466459 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 945.952571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 945.971478] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 945.979194] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 945.986557] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 945.993834] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 946.001111] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 946.008390] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 [ 946.033197] FAULT_INJECTION: forcing a failure. [ 946.033197] name failslab, interval 1, probability 0, space 0, times 0 [ 946.046889] CPU: 0 PID: 19544 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 946.054790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.065269] Call Trace: [ 946.067863] dump_stack+0x1fc/0x2ef [ 946.071505] should_fail.cold+0xa/0xf [ 946.075319] ? setup_fault_attr+0x200/0x200 [ 946.079653] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 946.085540] ? deref_stack_reg+0x1d0/0x1d0 [ 946.089767] ? deref_stack_reg+0x1d0/0x1d0 [ 946.094250] ? check_preemption_disabled+0x41/0x280 [ 946.099255] __should_failslab+0x115/0x180 [ 946.103482] should_failslab+0x5/0x10 [ 946.107272] kmem_cache_alloc+0x3f/0x370 [ 946.111326] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 946.116429] dst_alloc+0x106/0x1a0 [ 946.119963] ip6_dst_alloc+0x2e/0x100 [ 946.123755] ip6_create_rt_rcu+0x235/0x510 [ 946.127978] ? ip6_dst_alloc+0x100/0x100 [ 946.132120] ip6_pol_route_lookup+0x9fe/0xe10 [ 946.136644] ? fib6_multipath_select+0x2c0/0x2c0 [ 946.141385] ? __ipv6_sock_mc_join+0x472/0xa40 [ 946.145987] ? do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 946.151689] ? ipv6_setsockopt+0xb9/0x160 [ 946.155821] ? udpv6_setsockopt+0x5d/0xa0 [ 946.159955] ? __sys_setsockopt+0x14d/0x240 [ 946.164273] ? do_syscall_64+0xf9/0x620 [ 946.168237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.173589] fib6_rule_lookup+0x10b/0x4e0 [ 946.177738] ? fib6_multipath_select+0x2c0/0x2c0 [ 946.182489] ? fib6_lookup+0x300/0x300 [ 946.186366] ? mark_held_locks+0xf0/0xf0 [ 946.190427] ? mark_held_locks+0xf0/0xf0 [ 946.194475] ? should_fail+0x142/0x7b0 [ 946.198351] rt6_lookup+0x15f/0x220 [ 946.201965] ? ip6_pkt_prohibit_out+0x170/0x170 [ 946.206732] ? sock_kmalloc+0xb5/0x100 [ 946.210616] __ipv6_sock_mc_join+0x821/0xa40 [ 946.215015] ? __might_fault+0x192/0x1d0 [ 946.219065] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 946.224591] ? ipv6_update_options+0x3a0/0x3a0 [ 946.229158] ? __lock_acquire+0x6de/0x3ff0 [ 946.233379] ? __lock_acquire+0x6de/0x3ff0 [ 946.237645] ? __might_fault+0x11f/0x1d0 [ 946.241694] ? _parse_integer+0x132/0x180 [ 946.245843] ? __lock_acquire+0x6de/0x3ff0 [ 946.250072] ? _copy_from_user+0xd2/0x130 [ 946.254210] ? aa_label_sk_perm+0xf1/0x510 [ 946.258430] ? mark_held_locks+0xf0/0xf0 [ 946.262582] ? aa_profile_af_perm+0x2e0/0x2e0 [ 946.267061] ? lock_downgrade+0x720/0x720 [ 946.271210] ? check_preemption_disabled+0x41/0x280 [ 946.276231] ? aa_sk_perm+0x534/0x930 [ 946.280021] ? aa_af_perm+0x230/0x230 [ 946.283809] ipv6_setsockopt+0xb9/0x160 [ 946.287773] udpv6_setsockopt+0x5d/0xa0 [ 946.291738] __sys_setsockopt+0x14d/0x240 [ 946.295885] ? kernel_accept+0x310/0x310 [ 946.299934] ? fput+0x2b/0x190 [ 946.303113] ? ksys_write+0x1c8/0x2a0 [ 946.306905] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 946.312270] __x64_sys_setsockopt+0xba/0x150 [ 946.316665] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 946.321235] do_syscall_64+0xf9/0x620 [ 946.325023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.330209] RIP: 0033:0x466459 [ 946.333400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.352294] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 946.359993] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 946.367245] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 946.374499] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 [ 946.381750] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 946.389180] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 08:36:51 executing program 1 (fault-call:1 fault-nth:5): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 0 (fault-call:1 fault-nth:2): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) 08:36:51 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x11, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1dd, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:51 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 946.485547] FAULT_INJECTION: forcing a failure. [ 946.485547] name failslab, interval 1, probability 0, space 0, times 0 [ 946.497069] CPU: 1 PID: 19555 Comm: syz-executor.1 Not tainted 4.19.185-syzkaller #0 [ 946.504951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.514826] Call Trace: [ 946.520468] dump_stack+0x1fc/0x2ef [ 946.524121] should_fail.cold+0xa/0xf [ 946.527935] ? setup_fault_attr+0x200/0x200 08:36:51 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x88, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 946.532278] __should_failslab+0x115/0x180 [ 946.536529] should_failslab+0x5/0x10 [ 946.540343] kmem_cache_alloc_trace+0x46/0x380 [ 946.544949] ip6_mc_add_src+0x6a4/0x9d0 [ 946.548925] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 946.553995] ip6_mc_source+0xec9/0x15b0 [ 946.557988] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 946.563801] ? ipv6_update_options+0x3a0/0x3a0 [ 946.568400] ? __lock_acquire+0x6de/0x3ff0 [ 946.572644] ? __lock_acquire+0x6de/0x3ff0 [ 946.576889] ? __might_fault+0x11f/0x1d0 [ 946.580972] ? _parse_integer+0x132/0x180 08:36:51 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 946.585138] ? __lock_acquire+0x6de/0x3ff0 [ 946.589384] ? _copy_from_user+0xd2/0x130 [ 946.593544] ? aa_label_sk_perm+0xf1/0x510 [ 946.597788] ? mark_held_locks+0xf0/0xf0 [ 946.601864] ? aa_profile_af_perm+0x2e0/0x2e0 [ 946.606371] ? lock_downgrade+0x720/0x720 [ 946.610536] ? check_preemption_disabled+0x41/0x280 [ 946.615610] ? aa_sk_perm+0x534/0x930 [ 946.619434] ? aa_af_perm+0x230/0x230 [ 946.623253] ipv6_setsockopt+0xb9/0x160 [ 946.627238] udpv6_setsockopt+0x5d/0xa0 [ 946.631223] __sys_setsockopt+0x14d/0x240 [ 946.635380] ? kernel_accept+0x310/0x310 [ 946.639446] ? fput+0x2b/0x190 [ 946.642648] ? ksys_write+0x1c8/0x2a0 [ 946.646456] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 946.651952] __x64_sys_setsockopt+0xba/0x150 [ 946.656558] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 946.661131] do_syscall_64+0xf9/0x620 [ 946.664931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.670240] RIP: 0033:0x466459 [ 946.673521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.692533] RSP: 002b:00007fe88bdfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 946.700246] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 946.707557] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 946.714814] RBP: 00007fe88bdfb1d0 R08: 0000000000000108 R09: 0000000000000000 [ 946.722090] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 946.729345] R13: 00007ffc9ec2c4bf R14: 00007fe88bdfb300 R15: 0000000000022000 [ 946.759915] FAULT_INJECTION: forcing a failure. [ 946.759915] name failslab, interval 1, probability 0, space 0, times 0 [ 946.771275] CPU: 0 PID: 19563 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 946.779160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.788603] Call Trace: [ 946.791203] dump_stack+0x1fc/0x2ef [ 946.794840] should_fail.cold+0xa/0xf [ 946.798648] ? setup_fault_attr+0x200/0x200 [ 946.802968] ? __ipv6_dev_mc_inc+0x15f/0xa80 [ 946.807369] __should_failslab+0x115/0x180 [ 946.811594] should_failslab+0x5/0x10 [ 946.815389] kmem_cache_alloc_trace+0x46/0x380 [ 946.819963] __ipv6_dev_mc_inc+0x3d4/0xa80 [ 946.824190] __ipv6_sock_mc_join+0x63d/0xa40 [ 946.828604] ? __might_fault+0x192/0x1d0 [ 946.832693] do_ipv6_setsockopt.constprop.0+0x3930/0x3ed0 [ 946.838232] ? ipv6_update_options+0x3a0/0x3a0 [ 946.842810] ? __lock_acquire+0x6de/0x3ff0 [ 946.847041] ? __lock_acquire+0x6de/0x3ff0 [ 946.851268] ? __might_fault+0x11f/0x1d0 [ 946.855317] ? _parse_integer+0x132/0x180 [ 946.859457] ? __lock_acquire+0x6de/0x3ff0 [ 946.863684] ? _copy_from_user+0xd2/0x130 [ 946.867826] ? aa_label_sk_perm+0xf1/0x510 [ 946.872053] ? mark_held_locks+0xf0/0xf0 [ 946.876102] ? aa_profile_af_perm+0x2e0/0x2e0 [ 946.880583] ? lock_downgrade+0x720/0x720 [ 946.884719] ? check_preemption_disabled+0x41/0x280 [ 946.889739] ? aa_sk_perm+0x534/0x930 [ 946.893530] ? aa_af_perm+0x230/0x230 [ 946.897319] ipv6_setsockopt+0xb9/0x160 [ 946.901284] udpv6_setsockopt+0x5d/0xa0 [ 946.905249] __sys_setsockopt+0x14d/0x240 [ 946.909387] ? kernel_accept+0x310/0x310 [ 946.913436] ? fput+0x2b/0x190 [ 946.916617] ? ksys_write+0x1c8/0x2a0 [ 946.920408] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 946.925760] __x64_sys_setsockopt+0xba/0x150 [ 946.930157] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 946.934726] do_syscall_64+0xf9/0x620 [ 946.938517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.943691] RIP: 0033:0x466459 08:36:52 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 946.946870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 946.965767] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 946.973459] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 946.980713] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 946.987967] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 [ 946.995221] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 947.002476] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 08:36:52 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) 08:36:52 executing program 1 (fault-call:1 fault-nth:6): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 0 (fault-call:1 fault-nth:3): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1de, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:52 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) 08:36:52 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.173516] FAULT_INJECTION: forcing a failure. [ 947.173516] name failslab, interval 1, probability 0, space 0, times 0 [ 947.203250] CPU: 0 PID: 19588 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 947.211157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.220515] Call Trace: [ 947.223111] dump_stack+0x1fc/0x2ef [ 947.226747] should_fail.cold+0xa/0xf [ 947.230564] ? setup_fault_attr+0x200/0x200 [ 947.234871] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 947.240742] ? check_preemption_disabled+0x41/0x280 [ 947.245744] __should_failslab+0x115/0x180 [ 947.249973] should_failslab+0x5/0x10 [ 947.253757] kmem_cache_alloc+0x3f/0x370 [ 947.257816] ? ipv6_sysctl_rtcache_flush+0x110/0x110 [ 947.263974] dst_alloc+0x106/0x1a0 [ 947.267517] ip6_dst_alloc+0x2e/0x100 [ 947.271320] ip6_create_rt_rcu+0x235/0x510 [ 947.275562] ? ip6_dst_alloc+0x100/0x100 [ 947.279624] ip6_pol_route_lookup+0x9fe/0xe10 [ 947.284112] ? fib6_multipath_select+0x2c0/0x2c0 [ 947.288855] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 947.293969] fib6_rule_lookup+0x10b/0x4e0 [ 947.298646] ? fib6_multipath_select+0x2c0/0x2c0 [ 947.303395] ? fib6_lookup+0x300/0x300 [ 947.307270] ? round_jiffies_up_relative+0xd0/0xd0 [ 947.312196] ? mark_held_locks+0xf0/0xf0 [ 947.316260] rt6_lookup+0x15f/0x220 [ 947.319894] ? ip6_pkt_prohibit_out+0x170/0x170 [ 947.324565] ? lock_acquire+0x170/0x3c0 [ 947.328785] ? ip6_mc_source+0x132/0x15b0 [ 947.332917] ip6_mc_find_dev_rcu+0x3d/0x210 [ 947.337239] ip6_mc_source+0x1ce/0x15b0 [ 947.341208] ? __ipv6_sock_mc_join+0x6c4/0xa40 [ 947.345793] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 947.351316] ? ipv6_update_options+0x3a0/0x3a0 [ 947.355894] ? __lock_acquire+0x6de/0x3ff0 [ 947.360145] ? __lock_acquire+0x6de/0x3ff0 [ 947.364384] ? __might_fault+0x11f/0x1d0 [ 947.368443] ? _parse_integer+0x132/0x180 [ 947.372579] ? __lock_acquire+0x6de/0x3ff0 [ 947.376817] ? _copy_from_user+0xd2/0x130 [ 947.380962] ? aa_label_sk_perm+0xf1/0x510 [ 947.385183] ? mark_held_locks+0xf0/0xf0 [ 947.389244] ? aa_profile_af_perm+0x2e0/0x2e0 [ 947.393722] ? lock_downgrade+0x720/0x720 [ 947.397870] ? check_preemption_disabled+0x41/0x280 [ 947.402893] ? aa_sk_perm+0x534/0x930 [ 947.406703] ? aa_af_perm+0x230/0x230 [ 947.410501] ipv6_setsockopt+0xb9/0x160 [ 947.414460] udpv6_setsockopt+0x5d/0xa0 [ 947.418446] __sys_setsockopt+0x14d/0x240 [ 947.422611] ? kernel_accept+0x310/0x310 [ 947.426667] ? fput+0x2b/0x190 [ 947.429854] ? ksys_write+0x1c8/0x2a0 [ 947.433657] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 947.439018] __x64_sys_setsockopt+0xba/0x150 [ 947.443422] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 947.447997] do_syscall_64+0xf9/0x620 [ 947.451794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.456970] RIP: 0033:0x466459 08:36:52 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.460167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 947.479155] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 947.486864] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 947.494143] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 947.501414] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 [ 947.508770] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 947.516032] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 08:36:52 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x11, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 0 (fault-call:1 fault-nth:4): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:52 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:52 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x88, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.705953] FAULT_INJECTION: forcing a failure. [ 947.705953] name failslab, interval 1, probability 0, space 0, times 0 [ 947.717248] CPU: 0 PID: 19605 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 947.725134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.734487] Call Trace: [ 947.737084] dump_stack+0x1fc/0x2ef [ 947.740728] should_fail.cold+0xa/0xf [ 947.744541] ? setup_fault_attr+0x200/0x200 [ 947.748876] ? mark_held_locks+0xa6/0xf0 [ 947.752951] __should_failslab+0x115/0x180 [ 947.757202] should_failslab+0x5/0x10 [ 947.761011] __kmalloc+0x6d/0x3c0 [ 947.764475] ? sock_kmalloc+0xb5/0x100 [ 947.768373] sock_kmalloc+0xb5/0x100 [ 947.772100] ip6_mc_source+0x11c7/0x15b0 [ 947.776186] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 947.781730] ? ipv6_update_options+0x3a0/0x3a0 [ 947.786317] ? __lock_acquire+0x6de/0x3ff0 [ 947.790568] ? __lock_acquire+0x6de/0x3ff0 [ 947.795341] ? __might_fault+0x11f/0x1d0 [ 947.799421] ? _parse_integer+0x132/0x180 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1df, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.803589] ? __lock_acquire+0x6de/0x3ff0 [ 947.807844] ? _copy_from_user+0xd2/0x130 [ 947.812010] ? aa_label_sk_perm+0xf1/0x510 [ 947.816262] ? mark_held_locks+0xf0/0xf0 [ 947.820365] ? aa_profile_af_perm+0x2e0/0x2e0 [ 947.824875] ? lock_downgrade+0x720/0x720 [ 947.829050] ? check_preemption_disabled+0x41/0x280 [ 947.834099] ? aa_sk_perm+0x534/0x930 [ 947.837917] ? aa_af_perm+0x230/0x230 [ 947.841738] ipv6_setsockopt+0xb9/0x160 [ 947.845725] udpv6_setsockopt+0x5d/0xa0 [ 947.849714] __sys_setsockopt+0x14d/0x240 08:36:53 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.853864] ? kernel_accept+0x310/0x310 [ 947.857933] ? fput+0x2b/0x190 [ 947.861133] ? ksys_write+0x1c8/0x2a0 [ 947.864949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 947.870339] __x64_sys_setsockopt+0xba/0x150 [ 947.874760] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 947.879352] do_syscall_64+0xf9/0x620 [ 947.883173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.888365] RIP: 0033:0x466459 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 947.891570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 947.910478] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 947.918199] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 947.925481] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 947.932794] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 [ 947.940071] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 947.947349] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 [ 948.001055] device wlan1 entered promiscuous mode [ 948.009026] FAULT_INJECTION: forcing a failure. [ 948.009026] name failslab, interval 1, probability 0, space 0, times 0 [ 948.028693] CPU: 0 PID: 19613 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 948.036595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.045957] Call Trace: [ 948.048558] dump_stack+0x1fc/0x2ef [ 948.052200] should_fail.cold+0xa/0xf [ 948.056023] ? setup_fault_attr+0x200/0x200 [ 948.060342] ? if_nlmsg_size+0x455/0x980 [ 948.064396] __should_failslab+0x115/0x180 [ 948.068633] should_failslab+0x5/0x10 [ 948.072437] kmem_cache_alloc_node+0x54/0x3b0 [ 948.076931] __alloc_skb+0x71/0x560 [ 948.080547] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 948.085113] rtmsg_ifinfo+0x83/0x120 [ 948.088860] __dev_notify_flags+0x226/0x2b0 [ 948.093186] ? dev_change_name+0x780/0x780 [ 948.097429] ? __dev_change_flags+0x4b7/0x660 [ 948.102065] ? dev_set_allmulti+0x30/0x30 [ 948.106223] ? dev_ioctl+0x19d/0xc50 [ 948.109946] dev_change_flags+0xf0/0x140 [ 948.114104] dev_ifsioc+0x2ce/0x8c0 [ 948.117714] ? dev_load+0x200/0x200 [ 948.121329] ? check_preemption_disabled+0x41/0x280 [ 948.126348] dev_ioctl+0x1ab/0xc50 [ 948.129892] ? _copy_from_user+0xd2/0x130 [ 948.134036] sock_do_ioctl+0x148/0x2d0 [ 948.137913] ? compat_ifr_data_ioctl+0x150/0x150 [ 948.142670] ? __lock_acquire+0x621/0x3ff0 [ 948.146926] sock_ioctl+0x2ef/0x5d0 [ 948.150558] ? dlci_ioctl_set+0x30/0x30 [ 948.154552] ? ksys_write+0x241/0x2a0 [ 948.158352] ? dlci_ioctl_set+0x30/0x30 [ 948.162311] do_vfs_ioctl+0xcdb/0x12e0 [ 948.166197] ? lock_downgrade+0x720/0x720 [ 948.170357] ? check_preemption_disabled+0x41/0x280 [ 948.175391] ? ioctl_preallocate+0x200/0x200 [ 948.179801] ? __fget+0x356/0x510 [ 948.183846] ? do_dup2+0x450/0x450 [ 948.187380] ? vfs_write+0x393/0x540 [ 948.191094] ? fput+0x2b/0x190 [ 948.194291] ksys_ioctl+0x9b/0xc0 [ 948.197750] __x64_sys_ioctl+0x6f/0xb0 [ 948.201822] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 948.206398] do_syscall_64+0xf9/0x620 [ 948.210213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.215404] RIP: 0033:0x466459 [ 948.218589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 948.237582] RSP: 002b:00007f49ad459188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.245284] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 948.253492] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 948.260743] RBP: 00007f49ad4591d0 R08: 0000000000000000 R09: 0000000000000000 [ 948.268436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 948.275703] R13: 00007ffc03631d3f R14: 00007f49ad459300 R15: 0000000000022000 [ 948.287597] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 08:36:53 executing program 0 (fault-call:1 fault-nth:5): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 948.297299] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:53 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:53 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 948.390825] FAULT_INJECTION: forcing a failure. [ 948.390825] name failslab, interval 1, probability 0, space 0, times 0 [ 948.402159] CPU: 1 PID: 19636 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 948.410221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.420880] Call Trace: [ 948.423482] dump_stack+0x1fc/0x2ef [ 948.427135] should_fail.cold+0xa/0xf [ 948.430951] ? setup_fault_attr+0x200/0x200 [ 948.435294] __should_failslab+0x115/0x180 [ 948.439541] should_failslab+0x5/0x10 [ 948.443349] kmem_cache_alloc_trace+0x46/0x380 [ 948.447946] ip6_mc_add_src+0x6a4/0x9d0 [ 948.451931] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 948.458005] ip6_mc_source+0xec9/0x15b0 [ 948.463209] do_ipv6_setsockopt.constprop.0+0x3582/0x3ed0 [ 948.468754] ? ipv6_update_options+0x3a0/0x3a0 [ 948.473348] ? __lock_acquire+0x6de/0x3ff0 [ 948.477594] ? __lock_acquire+0x6de/0x3ff0 [ 948.481844] ? __might_fault+0x11f/0x1d0 [ 948.485915] ? _parse_integer+0x132/0x180 [ 948.490076] ? __lock_acquire+0x6de/0x3ff0 [ 948.494320] ? _copy_from_user+0xd2/0x130 [ 948.498483] ? aa_label_sk_perm+0xf1/0x510 [ 948.502727] ? mark_held_locks+0xf0/0xf0 [ 948.506799] ? aa_profile_af_perm+0x2e0/0x2e0 [ 948.511303] ? lock_downgrade+0x720/0x720 [ 948.515987] ? check_preemption_disabled+0x41/0x280 [ 948.521042] ? aa_sk_perm+0x534/0x930 [ 948.524856] ? aa_af_perm+0x230/0x230 [ 948.528757] ipv6_setsockopt+0xb9/0x160 [ 948.532748] udpv6_setsockopt+0x5d/0xa0 [ 948.536739] __sys_setsockopt+0x14d/0x240 [ 948.540896] ? kernel_accept+0x310/0x310 [ 948.544959] ? fput+0x2b/0x190 [ 948.548155] ? ksys_write+0x1c8/0x2a0 [ 948.551964] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 948.557336] __x64_sys_setsockopt+0xba/0x150 [ 948.561759] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 948.566352] do_syscall_64+0xf9/0x620 [ 948.570170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.575361] RIP: 0033:0x466459 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e0, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:53 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 948.578558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 948.598530] RSP: 002b:00007f1ec9945188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 948.606243] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 948.613516] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 948.620791] RBP: 00007f1ec99451d0 R08: 0000000000000108 R09: 0000000000000000 [ 948.628063] R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 [ 948.636041] R13: 00007ffe0c6ef5bf R14: 00007f1ec9945300 R15: 0000000000022000 [ 948.653203] device wlan1 left promiscuous mode [ 948.663376] device wlan1 entered promiscuous mode [ 948.672014] FAULT_INJECTION: forcing a failure. [ 948.672014] name failslab, interval 1, probability 0, space 0, times 0 [ 948.683415] CPU: 1 PID: 19644 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 948.691302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.700650] Call Trace: [ 948.703241] dump_stack+0x1fc/0x2ef [ 948.706861] should_fail.cold+0xa/0xf [ 948.710684] ? setup_fault_attr+0x200/0x200 [ 948.715015] ? setup_fault_attr+0x200/0x200 [ 948.719337] __should_failslab+0x115/0x180 [ 948.723575] should_failslab+0x5/0x10 [ 948.727361] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 948.732370] __kmalloc_node_track_caller+0x38/0x70 [ 948.737285] __alloc_skb+0xae/0x560 [ 948.740900] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 948.745466] rtmsg_ifinfo+0x83/0x120 [ 948.749165] __dev_notify_flags+0x226/0x2b0 [ 948.753471] ? dev_change_name+0x780/0x780 [ 948.757687] ? __dev_change_flags+0x4b7/0x660 [ 948.762175] ? dev_set_allmulti+0x30/0x30 [ 948.766307] ? dev_ioctl+0x19d/0xc50 [ 948.770020] dev_change_flags+0xf0/0x140 [ 948.774091] dev_ifsioc+0x2ce/0x8c0 [ 948.777700] ? dev_load+0x200/0x200 [ 948.781312] ? check_preemption_disabled+0x41/0x280 [ 948.786314] dev_ioctl+0x1ab/0xc50 [ 948.789839] ? _copy_from_user+0xd2/0x130 [ 948.793973] sock_do_ioctl+0x148/0x2d0 [ 948.798110] ? compat_ifr_data_ioctl+0x150/0x150 [ 948.802850] ? __lock_acquire+0x621/0x3ff0 [ 948.807088] sock_ioctl+0x2ef/0x5d0 [ 948.810724] ? dlci_ioctl_set+0x30/0x30 [ 948.814695] ? ksys_write+0x241/0x2a0 [ 948.818476] ? dlci_ioctl_set+0x30/0x30 [ 948.822435] do_vfs_ioctl+0xcdb/0x12e0 [ 948.826308] ? lock_downgrade+0x720/0x720 [ 948.830448] ? check_preemption_disabled+0x41/0x280 [ 948.835571] ? ioctl_preallocate+0x200/0x200 [ 948.839971] ? __fget+0x356/0x510 [ 948.843416] ? do_dup2+0x450/0x450 [ 948.846993] ? vfs_write+0x393/0x540 [ 948.850691] ? fput+0x2b/0x190 [ 948.853886] ksys_ioctl+0x9b/0xc0 [ 948.857333] __x64_sys_ioctl+0x6f/0xb0 [ 948.861322] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 948.865887] do_syscall_64+0xf9/0x620 [ 948.869676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.874856] RIP: 0033:0x466459 [ 948.878055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 948.896946] RSP: 002b:00007f49ad459188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.904650] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000466459 [ 948.911924] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 948.919176] RBP: 00007f49ad4591d0 R08: 0000000000000000 R09: 0000000000000000 [ 948.926435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 948.933692] R13: 00007ffc03631d3f R14: 00007f49ad459300 R15: 0000000000022000 08:36:54 executing program 0 (fault-call:1 fault-nth:6): r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 948.942520] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 948.956152] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:54 executing program 5 (fault-call:3 fault-nth:2): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e1, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.070687] device wlan1 left promiscuous mode [ 949.087790] device wlan1 entered promiscuous mode [ 949.093495] FAULT_INJECTION: forcing a failure. [ 949.093495] name failslab, interval 1, probability 0, space 0, times 0 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.117857] CPU: 1 PID: 19666 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 949.125780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.135142] Call Trace: [ 949.137750] dump_stack+0x1fc/0x2ef [ 949.141389] should_fail.cold+0xa/0xf [ 949.145190] ? inet6_fill_ifla6_attrs+0x1732/0x1df0 [ 949.150208] ? setup_fault_attr+0x200/0x200 [ 949.154536] ? rtnl_fill_ifinfo+0x26c7/0x36d0 [ 949.159050] __should_failslab+0x115/0x180 [ 949.163296] should_failslab+0x5/0x10 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.167109] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 949.172143] __kmalloc_node_track_caller+0x38/0x70 [ 949.177090] pskb_expand_head+0x159/0xf20 [ 949.181250] ? __kmalloc_node_track_caller+0x38/0x70 [ 949.186370] netlink_trim+0x200/0x250 [ 949.190187] netlink_broadcast_filtered+0x61/0xbc0 [ 949.195204] nlmsg_notify+0x157/0x1a0 [ 949.199010] rtmsg_ifinfo+0xf0/0x120 [ 949.202740] __dev_notify_flags+0x226/0x2b0 [ 949.207086] ? dev_change_name+0x780/0x780 [ 949.211328] ? __dev_change_flags+0x4b7/0x660 [ 949.215832] ? dev_set_allmulti+0x30/0x30 [ 949.219989] ? __lock_acquire+0x6de/0x3ff0 [ 949.224234] ? dev_ioctl+0x19d/0xc50 [ 949.227946] dev_change_flags+0xf0/0x140 [ 949.232007] dev_ifsioc+0x2ce/0x8c0 [ 949.235621] ? dev_load+0x200/0x200 [ 949.239233] ? check_preemption_disabled+0x41/0x280 [ 949.244671] dev_ioctl+0x1ab/0xc50 [ 949.248193] ? _copy_from_user+0xd2/0x130 [ 949.252323] sock_do_ioctl+0x148/0x2d0 [ 949.256193] ? compat_ifr_data_ioctl+0x150/0x150 [ 949.260931] ? __lock_acquire+0x621/0x3ff0 [ 949.265157] sock_ioctl+0x2ef/0x5d0 [ 949.268766] ? dlci_ioctl_set+0x30/0x30 [ 949.272724] ? ksys_write+0x241/0x2a0 [ 949.276507] ? dlci_ioctl_set+0x30/0x30 [ 949.280464] do_vfs_ioctl+0xcdb/0x12e0 [ 949.284332] ? lock_downgrade+0x720/0x720 [ 949.288463] ? check_preemption_disabled+0x41/0x280 [ 949.293464] ? ioctl_preallocate+0x200/0x200 [ 949.297869] ? __fget+0x356/0x510 [ 949.301304] ? do_dup2+0x450/0x450 [ 949.304858] ? vfs_write+0x393/0x540 [ 949.308564] ? fput+0x2b/0x190 [ 949.311742] ksys_ioctl+0x9b/0xc0 [ 949.315179] __x64_sys_ioctl+0x6f/0xb0 [ 949.319046] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 949.323624] do_syscall_64+0xf9/0x620 [ 949.327419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.332589] RIP: 0033:0x466459 [ 949.335771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.354653] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.362441] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 949.369691] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 949.376957] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 949.384653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.391913] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 08:36:54 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x22, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 5 (fault-call:3 fault-nth:3): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 949.430654] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 949.437678] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e2, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.520577] device wlan1 left promiscuous mode 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.584289] device wlan1 entered promiscuous mode 08:36:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x11, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.622241] FAULT_INJECTION: forcing a failure. [ 949.622241] name failslab, interval 1, probability 0, space 0, times 0 08:36:54 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x88, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.698456] CPU: 0 PID: 19689 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 949.706376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.715735] Call Trace: [ 949.718337] dump_stack+0x1fc/0x2ef [ 949.721977] should_fail.cold+0xa/0xf [ 949.725875] ? setup_fault_attr+0x200/0x200 [ 949.730213] ? lock_acquire+0x170/0x3c0 [ 949.734203] __should_failslab+0x115/0x180 [ 949.738449] should_failslab+0x5/0x10 [ 949.742252] kmem_cache_alloc_trace+0x284/0x380 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.746932] netdevice_event+0x1ad/0x700 [ 949.750999] ? update_gid_event_work_handler+0xb0/0xb0 [ 949.756279] ? is_eth_port_inactive_slave_filter+0x220/0x220 [ 949.762077] ? inetaddr_event+0x1a0/0x1a0 [ 949.766227] ? rdma_roce_rescan_device+0x30/0x30 [ 949.770985] ? is_ndev_for_default_gid_filter.part.0+0x250/0x250 [ 949.777160] ? enum_all_gids_of_dev_cb+0x210/0x210 [ 949.782097] ? is_eth_port_of_netdev_filter.part.0+0x2d0/0x2d0 [ 949.788080] ? ip_vs_dst_event+0x2ab/0x790 [ 949.792324] ? dev_map_notification+0x31/0x3d0 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 949.796919] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 949.802125] notifier_call_chain+0xc0/0x230 [ 949.806465] __dev_notify_flags+0x110/0x2b0 [ 949.810801] ? dev_change_name+0x780/0x780 [ 949.815041] ? __dev_change_flags+0x4b7/0x660 [ 949.819554] ? dev_set_allmulti+0x30/0x30 [ 949.823797] ? __lock_acquire+0x6de/0x3ff0 [ 949.828043] ? dev_ioctl+0x19d/0xc50 [ 949.831773] dev_change_flags+0xf0/0x140 [ 949.835848] dev_ifsioc+0x2ce/0x8c0 [ 949.839475] ? dev_load+0x200/0x200 [ 949.843089] ? check_preemption_disabled+0x41/0x280 [ 949.848267] dev_ioctl+0x1ab/0xc50 [ 949.851949] ? _copy_from_user+0xd2/0x130 [ 949.856088] sock_do_ioctl+0x148/0x2d0 [ 949.859974] ? compat_ifr_data_ioctl+0x150/0x150 [ 949.864725] ? __lock_acquire+0x621/0x3ff0 [ 949.868952] sock_ioctl+0x2ef/0x5d0 [ 949.872564] ? dlci_ioctl_set+0x30/0x30 [ 949.876546] ? ksys_write+0x241/0x2a0 [ 949.880343] ? dlci_ioctl_set+0x30/0x30 [ 949.884315] do_vfs_ioctl+0xcdb/0x12e0 [ 949.888200] ? lock_downgrade+0x720/0x720 [ 949.892332] ? check_preemption_disabled+0x41/0x280 [ 949.897333] ? ioctl_preallocate+0x200/0x200 [ 949.902249] ? __fget+0x356/0x510 [ 949.905687] ? do_dup2+0x450/0x450 [ 949.909209] ? vfs_write+0x393/0x540 [ 949.912912] ? fput+0x2b/0x190 [ 949.916109] ksys_ioctl+0x9b/0xc0 [ 949.920242] __x64_sys_ioctl+0x6f/0xb0 [ 949.924113] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 949.928679] do_syscall_64+0xf9/0x620 [ 949.932478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.937661] RIP: 0033:0x466459 [ 949.940904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 949.959787] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.967489] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 949.975790] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 949.983061] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 949.990414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.997690] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 950.015604] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 950.022941] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:55 executing program 5 (fault-call:3 fault-nth:4): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e3, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.110147] device wlan1 left promiscuous mode [ 950.124483] device wlan1 entered promiscuous mode 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.150526] FAULT_INJECTION: forcing a failure. [ 950.150526] name failslab, interval 1, probability 0, space 0, times 0 [ 950.170992] CPU: 0 PID: 19718 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 950.178902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.188262] Call Trace: [ 950.190871] dump_stack+0x1fc/0x2ef [ 950.194514] should_fail.cold+0xa/0xf 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.198326] ? setup_fault_attr+0x200/0x200 [ 950.202657] ? lock_acquire+0x170/0x3c0 [ 950.206651] __should_failslab+0x115/0x180 [ 950.210902] should_failslab+0x5/0x10 [ 950.214803] kmem_cache_alloc_trace+0x284/0x380 [ 950.219491] __ip_mc_inc_group+0x225/0xb10 [ 950.223736] ? igmpv3_del_delrec+0x760/0x760 [ 950.228157] ? skb_dequeue+0x125/0x180 [ 950.232063] ip_mc_up+0x13d/0x350 [ 950.235530] inetdev_event+0x2e4/0x1270 [ 950.239615] ? lock_downgrade+0x720/0x720 [ 950.243775] ? devinet_init_net+0x470/0x470 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.248103] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 950.253219] ? skb_dequeue+0x125/0x180 [ 950.257118] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 950.262330] notifier_call_chain+0xc0/0x230 [ 950.266669] __dev_notify_flags+0x110/0x2b0 [ 950.271005] ? dev_change_name+0x780/0x780 [ 950.275243] ? __dev_change_flags+0x4b7/0x660 [ 950.279751] ? dev_set_allmulti+0x30/0x30 [ 950.283907] ? __lock_acquire+0x6de/0x3ff0 [ 950.288156] ? dev_ioctl+0x19d/0xc50 [ 950.291883] dev_change_flags+0xf0/0x140 [ 950.296475] dev_ifsioc+0x2ce/0x8c0 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.300114] ? dev_load+0x200/0x200 [ 950.303756] ? check_preemption_disabled+0x41/0x280 [ 950.308782] dev_ioctl+0x1ab/0xc50 [ 950.312324] ? _copy_from_user+0xd2/0x130 [ 950.316478] sock_do_ioctl+0x148/0x2d0 [ 950.320375] ? compat_ifr_data_ioctl+0x150/0x150 [ 950.325145] ? __lock_acquire+0x621/0x3ff0 [ 950.329407] sock_ioctl+0x2ef/0x5d0 [ 950.333042] ? dlci_ioctl_set+0x30/0x30 [ 950.337302] ? ksys_write+0x241/0x2a0 [ 950.342758] ? dlci_ioctl_set+0x30/0x30 [ 950.346745] do_vfs_ioctl+0xcdb/0x12e0 [ 950.350647] ? lock_downgrade+0x720/0x720 [ 950.354810] ? check_preemption_disabled+0x41/0x280 [ 950.359836] ? ioctl_preallocate+0x200/0x200 [ 950.364256] ? __fget+0x356/0x510 [ 950.367720] ? do_dup2+0x450/0x450 [ 950.371259] ? vfs_write+0x393/0x540 [ 950.374973] ? fput+0x2b/0x190 [ 950.378154] ksys_ioctl+0x9b/0xc0 [ 950.381592] __x64_sys_ioctl+0x6f/0xb0 [ 950.385469] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 950.390037] do_syscall_64+0xf9/0x620 [ 950.393823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.398996] RIP: 0033:0x466459 [ 950.402194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 950.421077] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.428772] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 950.436025] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 950.443278] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 950.450533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 950.457789] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 950.475253] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 950.482398] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:55 executing program 5 (fault-call:3 fault-nth:5): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e4, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:55 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.575140] device wlan1 left promiscuous mode 08:36:55 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x22, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.616205] device wlan1 entered promiscuous mode [ 950.639507] FAULT_INJECTION: forcing a failure. [ 950.639507] name failslab, interval 1, probability 0, space 0, times 0 [ 950.650927] CPU: 1 PID: 19744 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 950.658816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.668174] Call Trace: [ 950.670778] dump_stack+0x1fc/0x2ef [ 950.674416] should_fail.cold+0xa/0xf [ 950.678228] ? setup_fault_attr+0x200/0x200 [ 950.682553] ? ip_mc_up+0x13d/0x350 [ 950.686268] ? inetdev_event+0x2e4/0x1270 [ 950.690430] ? notifier_call_chain+0xc0/0x230 [ 950.695014] ? __dev_notify_flags+0x110/0x2b0 [ 950.699509] ? dev_change_flags+0xf0/0x140 [ 950.703743] ? dev_ifsioc+0x2ce/0x8c0 [ 950.707545] ? dev_ioctl+0x1ab/0xc50 [ 950.711263] __should_failslab+0x115/0x180 [ 950.715504] should_failslab+0x5/0x10 [ 950.719309] kmem_cache_alloc_trace+0x46/0x380 [ 950.723898] __hw_addr_create_ex+0x5b/0x310 [ 950.728233] __hw_addr_add_ex+0x1ed/0x2b0 [ 950.732388] dev_mc_add+0x6c/0xb0 [ 950.735847] igmp_group_added+0x6d8/0x7f0 [ 950.740001] ? ip_mc_leave_src.isra.0+0x240/0x240 [ 950.744852] ? mark_held_locks+0xa6/0xf0 [ 950.749020] ? igmpv3_del_delrec+0x416/0x760 [ 950.753435] ? __local_bh_enable_ip+0x159/0x270 [ 950.758118] __ip_mc_inc_group+0x524/0xb10 [ 950.762370] ? igmpv3_del_delrec+0x760/0x760 [ 950.766789] ? skb_dequeue+0x125/0x180 [ 950.770684] ip_mc_up+0x13d/0x350 [ 950.774143] inetdev_event+0x2e4/0x1270 [ 950.778119] ? lock_downgrade+0x720/0x720 [ 950.782265] ? devinet_init_net+0x470/0x470 [ 950.786589] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 950.791704] ? skb_dequeue+0x125/0x180 [ 950.795603] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 950.800805] notifier_call_chain+0xc0/0x230 [ 950.805171] __dev_notify_flags+0x110/0x2b0 [ 950.809506] ? dev_change_name+0x780/0x780 [ 950.813743] ? __dev_change_flags+0x4b7/0x660 [ 950.818244] ? dev_set_allmulti+0x30/0x30 [ 950.822395] ? dev_ioctl+0x19d/0xc50 [ 950.826118] dev_change_flags+0xf0/0x140 [ 950.830193] dev_ifsioc+0x2ce/0x8c0 [ 950.833826] ? dev_load+0x200/0x200 [ 950.837455] ? check_preemption_disabled+0x41/0x280 [ 950.842484] dev_ioctl+0x1ab/0xc50 [ 950.846031] ? _copy_from_user+0xd2/0x130 [ 950.850185] sock_do_ioctl+0x148/0x2d0 [ 950.854078] ? compat_ifr_data_ioctl+0x150/0x150 [ 950.858840] ? __lock_acquire+0x621/0x3ff0 [ 950.863094] sock_ioctl+0x2ef/0x5d0 [ 950.866730] ? dlci_ioctl_set+0x30/0x30 [ 950.870716] ? ksys_write+0x241/0x2a0 [ 950.874526] ? dlci_ioctl_set+0x30/0x30 [ 950.878509] do_vfs_ioctl+0xcdb/0x12e0 [ 950.882401] ? lock_downgrade+0x720/0x720 [ 950.886641] ? check_preemption_disabled+0x41/0x280 [ 950.891661] ? ioctl_preallocate+0x200/0x200 [ 950.896076] ? __fget+0x356/0x510 [ 950.899537] ? do_dup2+0x450/0x450 [ 950.903078] ? vfs_write+0x393/0x540 [ 950.908531] ? fput+0x2b/0x190 [ 950.911906] ksys_ioctl+0x9b/0xc0 [ 950.915363] __x64_sys_ioctl+0x6f/0xb0 [ 950.919340] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 950.924011] do_syscall_64+0xf9/0x620 [ 950.927819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.933005] RIP: 0033:0x466459 [ 950.936202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 950.955186] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.962895] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 950.970178] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 950.977446] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 08:36:56 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 950.984725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 950.991994] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 08:36:56 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.042550] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 951.057318] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:56 executing program 5 (fault-call:3 fault-nth:6): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:56 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e5, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:56 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.181225] device wlan1 left promiscuous mode [ 951.201430] device wlan1 entered promiscuous mode [ 951.221954] FAULT_INJECTION: forcing a failure. [ 951.221954] name failslab, interval 1, probability 0, space 0, times 0 [ 951.233760] CPU: 1 PID: 19775 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 951.241644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.250998] Call Trace: [ 951.253711] dump_stack+0x1fc/0x2ef [ 951.257354] should_fail.cold+0xa/0xf [ 951.261168] ? __x64_sys_ioctl+0x6f/0xb0 [ 951.265239] ? setup_fault_attr+0x200/0x200 [ 951.269581] ? __lock_acquire+0x6de/0x3ff0 [ 951.273828] __should_failslab+0x115/0x180 [ 951.278071] should_failslab+0x5/0x10 [ 951.281874] kmem_cache_alloc_trace+0x46/0x380 [ 951.286461] __hw_addr_create_ex+0x5b/0x310 [ 951.290789] __hw_addr_add_ex+0x1ed/0x2b0 [ 951.294945] __hw_addr_sync_one+0x89/0x150 [ 951.299706] __hw_addr_sync+0x12a/0x240 [ 951.303688] ieee80211_set_multicast_list+0x182/0x200 [ 951.308881] ? ieee80211_change_mac+0x910/0x910 [ 951.313558] __dev_set_rx_mode+0x1d9/0x2f0 [ 951.317799] dev_mc_add+0xa1/0xb0 [ 951.321259] igmp_group_added+0x6d8/0x7f0 [ 951.325415] ? ip_mc_leave_src.isra.0+0x240/0x240 [ 951.330263] ? mark_held_locks+0xa6/0xf0 [ 951.334413] ? igmpv3_del_delrec+0x416/0x760 [ 951.338827] ? __local_bh_enable_ip+0x159/0x270 [ 951.343507] __ip_mc_inc_group+0x524/0xb10 [ 951.347757] ? igmpv3_del_delrec+0x760/0x760 [ 951.352167] ? skb_dequeue+0x125/0x180 [ 951.356120] ip_mc_up+0x13d/0x350 [ 951.359581] inetdev_event+0x2e4/0x1270 [ 951.363564] ? lock_downgrade+0x720/0x720 [ 951.367820] ? devinet_init_net+0x470/0x470 [ 951.372145] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 951.377270] ? skb_dequeue+0x125/0x180 [ 951.381255] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 951.386456] notifier_call_chain+0xc0/0x230 [ 951.390797] __dev_notify_flags+0x110/0x2b0 [ 951.395125] ? dev_change_name+0x780/0x780 [ 951.399362] ? __dev_change_flags+0x4b7/0x660 [ 951.403864] ? dev_set_allmulti+0x30/0x30 [ 951.408015] ? __lock_acquire+0x6de/0x3ff0 [ 951.412255] ? dev_ioctl+0x19d/0xc50 [ 951.416062] dev_change_flags+0xf0/0x140 [ 951.420129] dev_ifsioc+0x2ce/0x8c0 [ 951.423758] ? dev_load+0x200/0x200 [ 951.427391] ? check_preemption_disabled+0x41/0x280 [ 951.432418] dev_ioctl+0x1ab/0xc50 [ 951.435967] ? _copy_from_user+0xd2/0x130 [ 951.440127] sock_do_ioctl+0x148/0x2d0 [ 951.444020] ? compat_ifr_data_ioctl+0x150/0x150 [ 951.448782] ? __lock_acquire+0x621/0x3ff0 [ 951.453472] sock_ioctl+0x2ef/0x5d0 [ 951.457104] ? dlci_ioctl_set+0x30/0x30 [ 951.461140] ? ksys_write+0x241/0x2a0 [ 951.465006] ? dlci_ioctl_set+0x30/0x30 [ 951.468990] do_vfs_ioctl+0xcdb/0x12e0 [ 951.472882] ? lock_downgrade+0x720/0x720 [ 951.477037] ? check_preemption_disabled+0x41/0x280 [ 951.482059] ? ioctl_preallocate+0x200/0x200 [ 951.486474] ? __fget+0x356/0x510 [ 951.489932] ? do_dup2+0x450/0x450 [ 951.493565] ? vfs_write+0x393/0x540 [ 951.497287] ? fput+0x2b/0x190 [ 951.500487] ksys_ioctl+0x9b/0xc0 [ 951.503942] __x64_sys_ioctl+0x6f/0xb0 [ 951.507864] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 951.512447] do_syscall_64+0xf9/0x620 [ 951.516254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.521458] RIP: 0033:0x466459 [ 951.524657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.543568] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.551276] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 951.558544] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 951.565810] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 08:36:56 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.573078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.580434] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 951.601556] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 951.613879] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 08:36:56 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 5 (fault-call:3 fault-nth:7): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:56 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x31, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:56 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e6, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.746575] device wlan1 left promiscuous mode [ 951.762571] device wlan1 entered promiscuous mode [ 951.768911] FAULT_INJECTION: forcing a failure. [ 951.768911] name failslab, interval 1, probability 0, space 0, times 0 [ 951.789659] CPU: 0 PID: 19794 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 951.797564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.806921] Call Trace: [ 951.809528] dump_stack+0x1fc/0x2ef [ 951.813172] should_fail.cold+0xa/0xf [ 951.816989] ? setup_fault_attr+0x200/0x200 [ 951.821440] ? lock_acquire+0x170/0x3c0 [ 951.825433] __should_failslab+0x115/0x180 [ 951.829683] should_failslab+0x5/0x10 [ 951.833497] __kmalloc+0x2ab/0x3c0 [ 951.837052] ? ieee80211_alloc_chanctx+0x9d/0x3a0 [ 951.841904] ieee80211_alloc_chanctx+0x9d/0x3a0 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.846585] ieee80211_new_chanctx+0x74/0x2b0 [ 951.851099] ieee80211_vif_use_channel+0x731/0xaa0 [ 951.856049] ieee80211_join_mesh+0x784/0x990 [ 951.860478] __cfg80211_join_mesh+0x5be/0x1340 [ 951.865090] cfg80211_netdev_notifier_call+0x165c/0x1aa0 [ 951.870557] ? ip_mc_leave_src.isra.0+0x240/0x240 [ 951.875420] ? __cfg80211_leave+0x430/0x430 [ 951.879865] ? igmp_netdev_event+0x31/0x6d0 [ 951.884197] ? ipmr_device_event+0x1ab/0x220 [ 951.888616] ? __sanitizer_cov_trace_switch+0x4b/0x80 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x35, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.893814] notifier_call_chain+0xc0/0x230 [ 951.898244] __dev_notify_flags+0x110/0x2b0 [ 951.902576] ? dev_change_name+0x780/0x780 [ 951.906821] ? __dev_change_flags+0x4b7/0x660 [ 951.911325] ? dev_set_allmulti+0x30/0x30 [ 951.915705] ? __lock_acquire+0x6de/0x3ff0 [ 951.919952] ? dev_ioctl+0x19d/0xc50 [ 951.923678] dev_change_flags+0xf0/0x140 [ 951.927749] dev_ifsioc+0x2ce/0x8c0 [ 951.931382] ? dev_load+0x200/0x200 [ 951.935023] ? check_preemption_disabled+0x41/0x280 [ 951.940227] dev_ioctl+0x1ab/0xc50 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x36, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.943776] ? _copy_from_user+0xd2/0x130 [ 951.947937] sock_do_ioctl+0x148/0x2d0 [ 951.951836] ? compat_ifr_data_ioctl+0x150/0x150 [ 951.956597] ? __lock_acquire+0x621/0x3ff0 [ 951.960871] sock_ioctl+0x2ef/0x5d0 [ 951.964513] ? dlci_ioctl_set+0x30/0x30 [ 951.968508] ? ksys_write+0x241/0x2a0 [ 951.972318] ? dlci_ioctl_set+0x30/0x30 [ 951.976303] do_vfs_ioctl+0xcdb/0x12e0 [ 951.980203] ? lock_downgrade+0x720/0x720 [ 951.984361] ? check_preemption_disabled+0x41/0x280 [ 951.989409] ? ioctl_preallocate+0x200/0x200 [ 951.993836] ? __fget+0x356/0x510 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x37, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 951.997302] ? do_dup2+0x450/0x450 [ 952.000855] ? vfs_write+0x393/0x540 [ 952.004587] ? fput+0x2b/0x190 [ 952.007795] ksys_ioctl+0x9b/0xc0 [ 952.011259] __x64_sys_ioctl+0x6f/0xb0 [ 952.015151] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 952.019743] do_syscall_64+0xf9/0x620 [ 952.023559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.028755] RIP: 0033:0x466459 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x38, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 952.031953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 952.055285] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.062993] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 952.070274] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 952.077550] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 952.084826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 952.092101] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 952.101606] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready 08:36:57 executing program 5 (fault-call:3 fault-nth:8): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000200)={0x80000001, {0x8, 0x2, 0x8000, 0xffff, 0x8}}) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, 0x0, 0x4008801) preadv(r2, &(0x7f00000017c0), 0x1e7, 0x5000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x2e6a1000) 08:36:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x22, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 952.224253] device wlan1 left promiscuous mode [ 952.257513] device wlan1 entered promiscuous mode 08:36:57 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 952.279419] FAULT_INJECTION: forcing a failure. [ 952.279419] name failslab, interval 1, probability 0, space 0, times 0 [ 952.305964] CPU: 0 PID: 19830 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 952.313875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.323233] Call Trace: [ 952.325836] dump_stack+0x1fc/0x2ef 08:36:57 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 08:36:57 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 952.329489] should_fail.cold+0xa/0xf [ 952.333304] ? setup_fault_attr+0x200/0x200 [ 952.337640] ? lock_acquire+0x170/0x3c0 [ 952.341637] __should_failslab+0x115/0x180 [ 952.345892] should_failslab+0x5/0x10 [ 952.349795] __kmalloc+0x2ab/0x3c0 [ 952.353353] ? ieee80211_mesh_build_beacon+0x1f2/0x2080 [ 952.358733] ieee80211_mesh_build_beacon+0x1f2/0x2080 [ 952.363934] ? ieee80211_mps_local_status_update+0x328/0x610 [ 952.369751] ieee80211_start_mesh+0x23b/0x330 [ 952.374258] ieee80211_join_mesh+0x7f0/0x990 [ 952.378683] __cfg80211_join_mesh+0x5be/0x1340 [ 952.383287] cfg80211_netdev_notifier_call+0x165c/0x1aa0 [ 952.388754] ? ip_mc_leave_src.isra.0+0x240/0x240 [ 952.393693] ? __cfg80211_leave+0x430/0x430 [ 952.398050] ? igmp_netdev_event+0x31/0x6d0 [ 952.402377] ? ipmr_device_event+0x1ab/0x220 [ 952.406796] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 952.411996] notifier_call_chain+0xc0/0x230 [ 952.416334] __dev_notify_flags+0x110/0x2b0 [ 952.420664] ? dev_change_name+0x780/0x780 [ 952.424902] ? __dev_change_flags+0x4b7/0x660 [ 952.429406] ? dev_set_allmulti+0x30/0x30 [ 952.433555] ? __lock_acquire+0x6de/0x3ff0 [ 952.437793] ? dev_ioctl+0x19d/0xc50 [ 952.441516] dev_change_flags+0xf0/0x140 [ 952.445587] dev_ifsioc+0x2ce/0x8c0 [ 952.449224] ? dev_load+0x200/0x200 [ 952.452870] ? check_preemption_disabled+0x41/0x280 [ 952.457904] dev_ioctl+0x1ab/0xc50 [ 952.461452] ? _copy_from_user+0xd2/0x130 [ 952.465611] sock_do_ioctl+0x148/0x2d0 [ 952.469500] ? compat_ifr_data_ioctl+0x150/0x150 [ 952.474345] ? __lock_acquire+0x621/0x3ff0 [ 952.478606] sock_ioctl+0x2ef/0x5d0 [ 952.482245] ? dlci_ioctl_set+0x30/0x30 [ 952.486237] ? ksys_write+0x241/0x2a0 [ 952.490059] ? dlci_ioctl_set+0x30/0x30 [ 952.494036] do_vfs_ioctl+0xcdb/0x12e0 [ 952.497931] ? lock_downgrade+0x720/0x720 [ 952.502171] ? check_preemption_disabled+0x41/0x280 [ 952.507345] ? ioctl_preallocate+0x200/0x200 [ 952.511736] ? __fget+0x356/0x510 [ 952.515173] ? do_dup2+0x450/0x450 [ 952.518710] ? vfs_write+0x393/0x540 [ 952.522419] ? fput+0x2b/0x190 [ 952.525602] ksys_ioctl+0x9b/0xc0 [ 952.529051] __x64_sys_ioctl+0x6f/0xb0 [ 952.533045] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 952.537623] do_syscall_64+0xf9/0x620 [ 952.541419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.546640] RIP: 0033:0x466459 [ 952.549816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 952.568756] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.576457] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 952.583717] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 952.590970] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 952.598316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 952.605577] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 952.614745] kasan: CONFIG_KASAN_INLINE enabled [ 952.620419] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 952.630706] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 952.636962] CPU: 1 PID: 19830 Comm: syz-executor.5 Not tainted 4.19.185-syzkaller #0 [ 952.644845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.654205] RIP: 0010:__call_rcu.constprop.0+0x68/0x7f0 [ 952.659558] Code: 48 c7 c6 80 5d f8 89 e8 46 85 25 02 45 85 ed 0f 85 39 02 00 00 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 fa 05 00 00 48 89 da 4c 89 73 08 48 b8 00 00 00 [ 952.678448] RSP: 0018:ffff88809d5cf628 EFLAGS: 00010206 [ 952.683797] RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000 [ 952.691154] RDX: 0000000000000006 RSI: ffff88801fd10c30 RDI: 0000000000000030 [ 952.698414] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 952.705678] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff89f88180 [ 952.712938] R13: 0000000000000000 R14: 0000000000000028 R15: 0000000000000002 [ 952.720194] FS: 00007f49ad47a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 952.728404] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 952.734268] CR2: 00007f287403c0b8 CR3: 00000000b4c86000 CR4: 00000000001426e0 [ 952.741524] DR0: 0000000000000101 DR1: 0000000000000000 DR2: 0000000000000000 [ 952.748782] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 952.756036] Call Trace: [ 952.758640] ieee80211_stop_mesh+0x176/0x370 [ 952.763037] ieee80211_start_mesh+0x2f8/0x330 [ 952.767519] ieee80211_join_mesh+0x7f0/0x990 [ 952.771926] __cfg80211_join_mesh+0x5be/0x1340 [ 952.776503] cfg80211_netdev_notifier_call+0x165c/0x1aa0 [ 952.781941] ? ip_mc_leave_src.isra.0+0x240/0x240 [ 952.786773] ? __cfg80211_leave+0x430/0x430 [ 952.791107] ? igmp_netdev_event+0x31/0x6d0 [ 952.795433] ? ipmr_device_event+0x1ab/0x220 [ 952.800185] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 952.805369] notifier_call_chain+0xc0/0x230 [ 952.809683] __dev_notify_flags+0x110/0x2b0 [ 952.813993] ? dev_change_name+0x780/0x780 [ 952.818361] ? __dev_change_flags+0x4b7/0x660 [ 952.822847] ? dev_set_allmulti+0x30/0x30 [ 952.826981] ? __lock_acquire+0x6de/0x3ff0 [ 952.831205] ? dev_ioctl+0x19d/0xc50 [ 952.834905] dev_change_flags+0xf0/0x140 [ 952.838955] dev_ifsioc+0x2ce/0x8c0 [ 952.842568] ? dev_load+0x200/0x200 [ 952.846182] ? check_preemption_disabled+0x41/0x280 [ 952.851187] dev_ioctl+0x1ab/0xc50 [ 952.854713] ? _copy_from_user+0xd2/0x130 [ 952.858870] sock_do_ioctl+0x148/0x2d0 [ 952.862752] ? compat_ifr_data_ioctl+0x150/0x150 [ 952.867500] ? __lock_acquire+0x621/0x3ff0 [ 952.871728] sock_ioctl+0x2ef/0x5d0 [ 952.875345] ? dlci_ioctl_set+0x30/0x30 [ 952.879309] ? ksys_write+0x241/0x2a0 [ 952.883095] ? dlci_ioctl_set+0x30/0x30 [ 952.887056] do_vfs_ioctl+0xcdb/0x12e0 [ 952.890931] ? lock_downgrade+0x720/0x720 [ 952.895063] ? check_preemption_disabled+0x41/0x280 [ 952.900064] ? ioctl_preallocate+0x200/0x200 [ 952.904462] ? __fget+0x356/0x510 [ 952.907901] ? do_dup2+0x450/0x450 [ 952.911430] ? vfs_write+0x393/0x540 [ 952.915131] ? fput+0x2b/0x190 [ 952.918312] ksys_ioctl+0x9b/0xc0 [ 952.921758] __x64_sys_ioctl+0x6f/0xb0 [ 952.925632] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 952.930200] do_syscall_64+0xf9/0x620 [ 952.933990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.939163] RIP: 0033:0x466459 [ 952.942346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 952.961232] RSP: 002b:00007f49ad47a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.968923] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 952.976178] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 952.983432] RBP: 00007f49ad47a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 952.990804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 952.998058] R13: 00007ffc03631d3f R14: 00007f49ad47a300 R15: 0000000000022000 [ 953.005331] Modules linked in: [ 953.010943] ---[ end trace b693240f8d9d9b04 ]--- [ 953.019742] RIP: 0010:__call_rcu.constprop.0+0x68/0x7f0 [ 953.025182] Code: 48 c7 c6 80 5d f8 89 e8 46 85 25 02 45 85 ed 0f 85 39 02 00 00 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 fa 05 00 00 48 89 da 4c 89 73 08 48 b8 00 00 00 [ 953.045024] RSP: 0018:ffff88809d5cf628 EFLAGS: 00010206 [ 953.050960] RAX: dffffc0000000000 RBX: 0000000000000028 RCX: 0000000000000000 [ 953.059341] RDX: 0000000000000006 RSI: ffff88801fd10c30 RDI: 0000000000000030 [ 953.067008] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 953.074277] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff89f88180 [ 953.082145] R13: 0000000000000000 R14: 0000000000000028 R15: 0000000000000002 [ 953.089842] FS: 00007f49ad47a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 953.098629] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 953.104566] CR2: 00007fd44b693000 CR3: 00000000b4c86000 CR4: 00000000001426e0 [ 953.112541] DR0: 0000000000000101 DR1: 0000000000000000 DR2: 0000000000000000 [ 953.120186] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 953.127953] Kernel panic - not syncing: Fatal exception [ 953.133873] Kernel Offset: disabled [ 953.137547] Rebooting in 86400 seconds..