x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000efa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3575.664376][ T1812] x_tables: duplicate underflow at hook 1 13:55:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000540)={0x0, "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"}) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, &(0x7f0000000000)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000000c0)) 13:55:44 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000002fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r13, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r13, 0x1) recvmmsg(r13, &(0x7f0000005280), 0x2a5, 0x0, 0x0) fcntl$getownex(r9, 0x10, &(0x7f00000047c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = semget$private(0x0, 0x207, 0x0) semop(r1, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semop(r1, &(0x7f0000000200)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETNCNT(r1, 0x2, 0xe, &(0x7f0000000000)=""/143) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000000c0)={0x10000, 0xa, 0x4, 0x0, 0x7ff, {0x77359400}, {0x2, 0x5, 0x71, 0x42, 0x7, 0x0, "5742f023"}, 0x6, 0x4, @offset=0x80000001, 0x3, 0x0, 0xffffffffffffffff}) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000180)) 13:55:44 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r13, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r13, 0x1) recvmmsg(r13, &(0x7f0000005280), 0x2a5, 0x0, 0x0) fcntl$getownex(r9, 0x10, &(0x7f00000047c0)) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:55:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:45 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3577.314518][ T2346] x_tables: duplicate underflow at hook 1 13:55:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r13, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r13, 0x1) recvmmsg(r13, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:55:45 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3577.660133][ T2650] x_tables: duplicate underflow at hook 1 13:55:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0x0, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:46 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r13, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r13, 0x1) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0x0, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:46 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r13, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) [ 3579.198056][ T3181] x_tables: duplicate underflow at hook 1 13:55:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:47 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000106000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:47 executing program 5 (fault-call:1 fault-nth:0): r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:47 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000128000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:47 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r13, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:47 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, &(0x7f0000000040)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) 13:55:47 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={r1, r4, 0x8001}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r5, 0x0) sendfile(r0, r5, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r5, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x92f7, 0xbe9, 0x0, 0xe551}}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDSKBSENT(r6, 0x4b4a, 0x0) [ 3580.269365][ T3574] x_tables: duplicate underflow at hook 1 13:55:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x5) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000000e200", @ANYRES32=r4, @ANYBLOB="00000000000000001c001a8018000a8014000700fe880000000000000000000000000001"], 0x3c}}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r6 = accept(r5, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r6, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) bind$can_j1939(r6, &(0x7f0000000140)={0x1d, r4, 0x3, {0x1, 0x0, 0x64b946ca93db7dbc}, 0x5ed3500c7c6226f2}, 0xd) 13:55:48 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0x18}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x4001850) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}, {&(0x7f000000b500)=""/153, 0x99}], 0x2}, 0x40) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r4, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r6, 0x0) sendfile(r5, r6, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r6, 0xb703, 0x0) mq_timedsend(r6, &(0x7f0000000100)="1b06cd02da469dca1f3dd3cb44cd918e628fdc349ac9219b64d7028e01414f89332c25e26957a48ce12688f01a51ee0cfa9a54682dc9a6fde1924c069968f52484d70cd5f3b6d56a6484fec01ce3aa200b0b3403de858f894564c990fae2ea8a0c7a3fa3e51702b4eeea1f2d22e0fd274222f17e8c143112046350e06afb8878b90ec652be194d0c430d6e0dcd85cd18466f7d048820c81f676768e412751b7ba75b589ab6f0a260c8f6c4084ce0c242435ea0d324c3d5fef4", 0xb9, 0x101, &(0x7f0000000200)) sendfile(r3, r4, 0x0, 0x800000000024) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r8 = accept(r7, 0x0, 0x0) sendmmsg$alg(r8, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0x18}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r8, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r8, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$NS_GET_NSTYPE(r4, 0xb703, 0x0) ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x6, @loopback, 0x1}, 0x1c) 13:55:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:48 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000000000000003e4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3580.945249][ T3843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3843 comm=syz-executor.4 13:55:48 executing program 5: r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x9a284, 0x0) r2 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r2, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r2, 0x1) recvmmsg(r2, &(0x7f0000005280), 0x2a5, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r2, 0x6}) [ 3581.158683][ T3959] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3959 comm=syz-executor.4 13:55:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:49 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) 13:55:49 executing program 5: r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x0, 0x80, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) pipe2(&(0x7f0000000000), 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) epoll_pwait(r2, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0xffffffff, &(0x7f0000000100)={0x3}, 0x8) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200002f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r1, 0x1) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000180)=0x6e, 0x800) recvmmsg(r2, &(0x7f00000012c0)=[{{&(0x7f0000000300)=@can, 0x80, &(0x7f0000000280)=[{&(0x7f0000000380)=""/146, 0x92}], 0x1, &(0x7f00000004c0)=""/87, 0x57}, 0x8}, {{&(0x7f0000000540)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000005c0)=""/72, 0x48}, {&(0x7f0000000640)=""/245, 0xf5}, {&(0x7f0000000780)=""/172, 0xac}, {&(0x7f0000000840)=""/96, 0x60}, {&(0x7f00000008c0)=""/138, 0x8a}, {&(0x7f0000000440)=""/19, 0x13}, {&(0x7f0000000980)=""/192, 0xc0}], 0x7, &(0x7f0000002040)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000000ac0)=@caif=@rfm, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000b40)=""/60, 0x3c}, {&(0x7f0000000b80)=""/168, 0xa8}, {&(0x7f0000000c40)=""/160, 0xa0}, {&(0x7f0000000d00)=""/54, 0x36}, {&(0x7f0000000d40)=""/245, 0xf5}, {&(0x7f0000000e40)=""/152, 0x98}], 0x6, &(0x7f0000000f80)=""/87, 0x57}, 0x20}, {{&(0x7f0000001000)=@x25={0x9, @remote}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001080)=""/139, 0x8b}], 0x1, &(0x7f0000001180)=""/11, 0xb}, 0x87}], 0x4, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000140)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r6 = accept(r5, 0x0, 0x0) sendmmsg$alg(r6, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r6, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r8 = accept(r7, 0x0, 0x0) sendmmsg$alg(r8, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r8, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r8, 0x12, 0x2, &(0x7f00000011c0)=""/22, &(0x7f0000001200)=0x16) sendmsg$IPCTNL_MSG_EXP_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x10, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x3}, [@CTA_EXPECT_MASTER={0x10, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_NAT={0x14, 0xa, [@CTA_EXPECT_NAT_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2f}}]}]}]}, 0x38}}, 0x812) close(r4) r9 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r9, 0x0) sendfile(r4, r9, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r9, 0xb703, 0x0) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) 13:55:49 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="00000000000000000000000000000000000000000002fb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:49 executing program 5: r0 = mq_open(&(0x7f0000000040)='-\x00\x00', 0x80, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/180, 0xfffffffffffffee4}], 0x1a7, 0x0) 13:55:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf0, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:49 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000000)=0x80000000) 13:55:50 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x9, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f00000000c0)={0xa, &(0x7f0000000040)=[{0x81, 0x7f, 0x1f, 0x4}, {0x363, 0x2, 0x1, 0x1a9c5b56}, {0x2, 0xcf, 0x5, 0x2}, {0x1, 0x1, 0x1d, 0x7}, {0x3, 0x6, 0x0, 0x8}, {0xf66, 0x4, 0x4, 0x2}, {0x1f, 0x5, 0xf1, 0x4}, {0x100, 0x40, 0xd8, 0x1}, {0x1, 0x40, 0x9, 0x7ff}, {0x3, 0x1, 0x3, 0x80}]}, 0x10) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:50 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:50 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$KDSKBSENT(r1, 0x4b4a, 0x0) 13:55:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:55:50 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) 13:55:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:50 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x2}}, 0x18) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) 13:55:50 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000005280), 0x2a5, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x0, 0x0) 13:55:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x10, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x0, 0x800, 0x4ca}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0xf000000, 0x6, 0x800, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xa10001, 0x1ff, [], @value=0x2000000}}) getsockname$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev}, &(0x7f0000000280)=0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r3 = accept(r2, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) accept$alg(r4, 0x0, 0x0) r5 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r5, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r6 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r6, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r6, 0x1) recvmmsg(r6, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r7 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r7, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r7, 0x1) recvmmsg(r7, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x406, r7) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="749a4c55319fb9ec", @ANYRES16=r9, @ANYBLOB="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"], 0x930}, 0x1, 0x0, 0x0, 0x8000}, 0x24000040) shutdown(r5, 0x1) recvmmsg(r5, &(0x7f0000005280), 0x2a5, 0x0, 0x0) sync_file_range(r5, 0xfff, 0x6, 0x2) sendmmsg$alg(r3, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0x18}], 0x10000000000000b3, &(0x7f0000000480)=[@op={0xfffffffffffffe87}], 0x18, 0x8001}], 0x1, 0x0) recvmsg(r3, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb7e}], 0x2, 0x0, 0xfffffffffffffed3}, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000100)=""/93) 13:55:51 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, &(0x7f0000000140)) r2 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80, 0x0) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x100) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f00000000c0)) 13:55:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x300, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:51 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{&(0x7f0000000040)=""/216, 0xd8}, {&(0x7f0000000140)=""/66, 0x42}, {&(0x7f00000001c0)=""/183, 0xb7}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x10000038, 0x8000000) 13:55:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x300, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000100)) r3 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r3, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0xffffffffffffffd5) shutdown(r3, 0x1) recvmmsg(r3, &(0x7f0000005280), 0x2a5, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) 13:55:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x500, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0xfdef}]) io_getevents(r1, 0xf29a, 0x0, &(0x7f0000000000), 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b4a, 0x0) 13:55:51 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000002040)={{0x0, 0x0, 0x80, {0x109000, 0x5000, 0x3}}, "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", "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"}) r4 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r4, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:51 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r4}}]}) 13:55:52 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/130, 0x82}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r2, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r2, 0x1) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000300)=0xc) recvmmsg(r2, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x3bb, &(0x7f00000007c0)={&(0x7f0000000780)=@getchain={0x24, 0x66, 0x96419197e6150a51, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x4}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e23, 0x3, @loopback, 0x3}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000040)={r4, 0x7, 0x0, 0x0, 0x35, 0x7}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r4, 0x6, 0x0, 0x8}, &(0x7f0000000180)=0x10) r5 = accept(r1, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r5, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getpeername$tipc(r5, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) 13:55:52 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000001060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:52 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000001280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:52 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000000)={0x5, 0x10001, {r2}, {r3}, 0x6, 0x3f}) r4 = mq_open(&(0x7f0000000040)='-\x00\x00\xca\xac\xe1xI\xec\xa3G\xd4\x10\nV\xc8\x03&\xe9Mm\xb3O\xd6oz\"\xe4u\xbe\x01\x8b\x99\x9e\xe4\x93W\x06A\xa05\x96\xe0\x975\xefO\x97\xd1\xbd\xde\x92)\xa0\x97/\xda\x01 \n\v\xfa\xc3>m\x06\x1bp?\xf0\xd2%=\xfa\xab \xf7 S\x17k\xed\xa0qA\xfcl\xe4\xfd\xf5\xf9K\x85&!\x89\xb9\xde\xa8\x7f\xbe\xdcX\xd3\xa7\x85g{\x11\x94\x83\xf7\x89\xecma\xb6w\xa5p\xcf\xdf*\xd3 \xce\xe9-\x8b\x06-Z\x86L\x8a\xf4\x05Jf\t^\x90\xe2\xe1\xfe\xc4\xf1\x13\xdaZ\x9d\xa1\xe3\x1b_]\x17E\x0e6\xa1SG,\xb8&T\xf7\x8f\xa4\xe83\x16\x8c\x15\x10\xf8\xbez\xb4\xd2N\xa0,x*\x86\x19-\xa4\xf9\xce', 0x3543945436b96d13, 0x5319ea257bffa9c7, 0x0) preadv(r4, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x600, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$kcm(0x2, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='veth1_to_team\x00', 0x10) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$kcm(0x2, 0x2, 0x73) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='veth1_to_team\x00', 0x10) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0x10) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) 13:55:53 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$USBDEVFS_GETDRIVER(r1, 0x41045508, &(0x7f0000000040)={0x3, "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"}) r2 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:53 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) [ 3585.479370][ T5561] x_tables: duplicate underflow at hook 1 13:55:53 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10000, 0x0) fcntl$notify(r0, 0x402, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000006, 0x10, r0, 0x0) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x0, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x6, 0x4) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) 13:55:53 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000003e40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x700, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:53 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240), 0x0, 0x0) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x0, 0x2}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, @nfc={0x27, 0x1, 0x0, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x2d}, @tipc=@id={0x1e, 0x3, 0x3, {0x4e21}}, 0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='bridge0\x00', 0x3f, 0x40, 0x55d}) 13:55:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) r2 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r2, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r2, 0x1) recvmmsg(r2, &(0x7f0000005280), 0x2a5, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0xd6, "cd1c156550993a824cde8c9df17f93d4f51302050158ec7bee88ce0b66e5f242ae0744efa8ef4d8a7aef3a1ce1a2a46024b9cc5ec3e5697fdc0c213c0d95b9bbc32cb24453d7ba8440ce16b9123e9fefa701a695eca1f620f0401b2d0d03897b483a0c4e99ed342c6addb9f052dd346d77a61b66d6050857653c2868ba4a852010ab214ac03879a75f7851c9d47903421aa016c9e2aa7283916e9a495f704716375723e662ceb0fdce62d0f90b490dacf9bb50bdf0e55260aadbf8a8256f791733813af60885e8001a9d758b0a4cd27969dd1f6c1f47"}, &(0x7f0000000180)=0xfa) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 13:55:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:53 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) 13:55:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x900, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:54 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000180), 0x0, 0x10000) 13:55:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) r1 = open(&(0x7f0000000680)='./file0\x00', 0x8000, 0x38) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) sendmsg$nl_generic(r1, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0xccdf9a2c8406b031}, 0xc, &(0x7f00000007c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="900000002f000000cd04285bfedbdf250d00000008003500", @ANYRES32=r2, @ANYBLOB="d2df2684f16d1c04e29a31c2ffd1ac1d0011c777fb16d447907d25a455bd1484519eb4ff575f9ac6ba80bc6918139a4c9c26e1cd9ab49b72965711d638ae45d8e51884f81de78cdd4bec46e7826de5f6cc4ff85560af945546000aa89ef0dc2ec3af7caf48b5a68f7d198127763549410ee946f4"], 0x90}, 0x1, 0x0, 0x0, 0x8040}, 0xe7ad5a159f53ad18) 13:55:54 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000002fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) [ 3586.472290][ T6120] x_tables: duplicate underflow at hook 1 13:55:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:54 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x4) 13:55:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0xa00, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:54 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x4) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r2, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r2, 0x1) recvmmsg(r2, &(0x7f0000005280), 0x2a5, 0x0, 0x0) dup3(r2, r1, 0x80000) 13:55:54 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x7) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000080)) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:55 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:55 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001240), 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x88c02, 0x181) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) 13:55:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x400200, 0x0) 13:55:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0xb00, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:55 executing program 5: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r5, 0x0) sendfile(r4, r5, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r5, 0xb703, 0x0) write$FUSE_STATFS(r5, &(0x7f0000000300)={0x60, 0x0, 0x4, {{0x4, 0x5, 0x7fffffff, 0xffff, 0x1, 0x5, 0x2}}}, 0x60) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x3bb, &(0x7f00000007c0)={&(0x7f0000000780)=@getchain={0x24, 0x66, 0x96419197e6150a51, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x4}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e23, 0x3, @loopback, 0x3}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000040)={r6, 0x7, 0x0, 0x0, 0x35, 0x7}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000180)={r6, 0x7, 0x20}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={r7, 0x100}, &(0x7f0000000240)=0x8) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000005280), 0x2a5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev, @in=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) r9 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r9, 0x0) sendfile(r8, r9, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r9, 0xb703, 0x0) ioctl$MON_IOCT_RING_SIZE(r9, 0x9204, 0xf3bb8) r10 = mq_open(&(0x7f0000000000)='-$\x00', 0x2, 0x28, 0x0) preadv(r10, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:55 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDSKBSENT(r0, 0x4b4a, 0x0) 13:55:55 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000440)={0x5, 0x3, @stop_pts=0x4}) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) mq_timedsend(r1, &(0x7f0000000280)="2353d1119f4eb6a96df7fb454a808846939e85f42a54096cbde4256006bde775fa384585931265", 0x27, 0x9, &(0x7f00000002c0)={0x77359400}) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r6 = socket$inet(0x2, 0x4040000000000001, 0x0) r7 = accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @multicast2}, &(0x7f0000000340)=0x10) getsockopt$inet_mreqsrc(r7, 0x0, 0x27, &(0x7f0000000380)={@dev, @local, @remote}, &(0x7f00000003c0)=0xc) bind$inet(r6, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r6, 0x1) recvmmsg(r6, &(0x7f0000005280), 0x2a5, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000180)={0x2, 0x9, 0x4, 0xd8e5f8b293ffa4ff, 0x7, {r4, r5/1000+10000}, {0x1, 0x0, 0x9, 0x81, 0xff, 0x4e, "df51f0fa"}, 0x3ff, 0x3, @userptr=0x61eb1af2, 0x4a, 0x0, r6}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) mq_timedsend(r1, &(0x7f0000000040)="2bb4d5eac286933e59d8539c0622d99ace55f8cd9b13909daf27feec49c8d025aac54ba9be65559fcf153ed389d7da851f03668826466a43d33c7cd45cfcefae30d1b8b8eabdf0a5880c03b8b65fc84c09b4e2c86b9d26a7b55d307b08c7c6244c6a6aefe781be806294625c31de01a62e1114aafdbf3ee00991af646e854e8fb66ec6cc9a2f6ac6bad0267aaec8932fc7911e6a5ff85271b0f3db61e9bb22f7d41718c8519ff8e4ec4277afb562c87a0758547d276ff559e494cd273a5e85", 0xbf, 0x9, &(0x7f0000000100)={0x0, 0x1c9c380}) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:55 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r10, 0x1) recvmmsg(r10, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r11 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r11, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r11, 0x1) recvmmsg(r11, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r12 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r12, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r12, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r12, 0x1) recvmmsg(r12, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r14) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r10, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r12) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:55:56 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:56 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x100, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={{0x3, 0x0, @descriptor="5e9ffad23708a822"}}) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0xc00, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:56 executing program 5: r0 = mq_open(&(0x7f0000000000)='\x00\x00\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000001140)=""/177, 0xb1}, {&(0x7f0000000180)=""/217, 0xd9}], 0x2, 0x1ff) 13:55:56 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000060100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:56 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b46, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:55:56 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000040)=""/137, 0x89}, {&(0x7f0000000100)=""/205, 0xcd}, {&(0x7f0000000200)=""/120, 0x78}, {&(0x7f0000000280)=""/158, 0x9e}], 0x4) 13:55:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) recvmmsg(r9, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0xd00, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) [ 3589.103568][ T7149] FAULT_INJECTION: forcing a failure. [ 3589.103568][ T7149] name failslab, interval 1, probability 0, space 0, times 0 [ 3589.183061][ T7149] CPU: 1 PID: 7149 Comm: syz-executor.4 Not tainted 5.5.0-rc6-syzkaller #0 [ 3589.191721][ T7149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3589.201818][ T7149] Call Trace: [ 3589.205130][ T7149] dump_stack+0x197/0x210 [ 3589.209495][ T7149] should_fail.cold+0xa/0x15 [ 3589.214120][ T7149] ? fault_create_debugfs_attr+0x180/0x180 [ 3589.220652][ T7149] ? ___might_sleep+0x163/0x2c0 [ 3589.225541][ T7149] __should_failslab+0x121/0x190 [ 3589.230510][ T7149] should_failslab+0x9/0x14 [ 3589.235043][ T7149] __kmalloc+0x2e0/0x770 [ 3589.239305][ T7149] ? mark_held_locks+0xf0/0xf0 [ 3589.244087][ T7149] ? _parse_integer+0x190/0x190 [ 3589.248951][ T7149] ? tomoyo_realpath_from_path+0xc5/0x660 [ 3589.254689][ T7149] tomoyo_realpath_from_path+0xc5/0x660 [ 3589.260260][ T7149] ? tomoyo_path_number_perm+0x193/0x520 [ 3589.265919][ T7149] tomoyo_path_number_perm+0x1dd/0x520 [ 3589.271393][ T7149] ? tomoyo_path_number_perm+0x193/0x520 [ 3589.277049][ T7149] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3589.282876][ T7149] ? perf_trace_lock_acquire+0xf5/0x530 [ 3589.288443][ T7149] ? ___might_sleep+0x163/0x2c0 [ 3589.293329][ T7149] ? selinux_file_mprotect+0x620/0x620 [ 3589.298797][ T7149] ? __fget+0x37f/0x550 [ 3589.302976][ T7149] ? ksys_dup3+0x3e0/0x3e0 [ 3589.307402][ T7149] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3589.313654][ T7149] ? fput_many+0x12c/0x1a0 [ 3589.318684][ T7149] tomoyo_file_ioctl+0x23/0x30 [ 3589.323456][ T7149] security_file_ioctl+0x77/0xc0 [ 3589.328401][ T7149] ksys_ioctl+0x57/0xd0 [ 3589.332564][ T7149] __x64_sys_ioctl+0x73/0xb0 [ 3589.337163][ T7149] do_syscall_64+0xfa/0x790 [ 3589.341676][ T7149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3589.347568][ T7149] RIP: 0033:0x45af49 [ 3589.351465][ T7149] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3589.371071][ T7149] RSP: 002b:00007f30d701bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:55:57 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000180)=ANY=[@ANYBLOB="004749e3c3c07e29ca813662a202db00000007000036ffffff80010000000033b7244ee2e6cefc62dc47c8a1d8fc135e7e425aa21c6206a758cf63e7bd61"]) r3 = socket$inet(0x2, 0x0, 0xf9) bind$inet(r3, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r4 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r4, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r4, 0x1) recvmmsg(r4, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r5 = dup(r4) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "37d18f524f9fc792", "f0466769d7c91b00c12d02e583aa7cdc", "d2e6234b", "4e4208e227a1c421"}, 0x28) sendto$inet(r2, 0x0, 0xffffffffffffff7e, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) shutdown(r3, 0x1) recvmmsg(r3, &(0x7f0000005280), 0x2a5, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000001140)=""/187, 0xfffffffffffffe59}], 0x1, 0x0) [ 3589.379485][ T7149] RAX: ffffffffffffffda RBX: 00007f30d701bc90 RCX: 000000000045af49 [ 3589.387482][ T7149] RDX: 0000000020000540 RSI: 0000000000004b46 RDI: 0000000000000003 [ 3589.395555][ T7149] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3589.403527][ T7149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30d701c6d4 [ 3589.411495][ T7149] R13: 00000000004c43ba R14: 00000000004daf60 R15: 0000000000000004 13:55:57 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000280100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3589.602987][ T7149] ERROR: Out of memory at tomoyo_realpath_from_path. 13:55:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) [ 3589.653952][ T7263] x_tables: duplicate underflow at hook 1 13:55:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r9, 0x1) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:57 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b46, &(0x7f0000000540)={0x0, "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"}) 13:55:57 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x9c0000, 0x5a6, 0x101, r1, 0x0, &(0x7f00000000c0)={0x0, 0x2, [], @p_u8=&(0x7f0000000080)=0x3f}}) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000140)={@dev, @local}, &(0x7f0000000180)=0x8) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4002, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) [ 3589.969716][ T7463] FAULT_INJECTION: forcing a failure. [ 3589.969716][ T7463] name failslab, interval 1, probability 0, space 0, times 0 13:55:57 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:57 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x6) mq_open(&(0x7f0000000280)='mime_type\x00', 0x8c4, 0x52846ba71eb05543, &(0x7f00000002c0)={0xfffffffffffffffe, 0x1, 0x4}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$FUSE_LK(r2, &(0x7f0000000240)={0x28, 0x0, 0x7, {{0x1, 0x9, 0x0, 0xffffffffffffffff}}}, 0x28) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000080)={0x20, 0x10, [0x9, 0x8, 0x1, 0x27e8]}) [ 3590.067779][ T7463] CPU: 0 PID: 7463 Comm: syz-executor.4 Not tainted 5.5.0-rc6-syzkaller #0 [ 3590.076449][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3590.086525][ T7463] Call Trace: [ 3590.089834][ T7463] dump_stack+0x197/0x210 [ 3590.094187][ T7463] should_fail.cold+0xa/0x15 [ 3590.098802][ T7463] ? fault_create_debugfs_attr+0x180/0x180 [ 3590.104630][ T7463] ? ___might_sleep+0x163/0x2c0 [ 3590.109514][ T7463] __should_failslab+0x121/0x190 [ 3590.114473][ T7463] should_failslab+0x9/0x14 [ 3590.119103][ T7463] __kmalloc+0x2e0/0x770 [ 3590.123371][ T7463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3590.129632][ T7463] ? d_absolute_path+0x11b/0x170 [ 3590.134583][ T7463] ? __d_path+0x140/0x140 [ 3590.138925][ T7463] ? tomoyo_encode2.part.0+0xf5/0x400 [ 3590.144318][ T7463] tomoyo_encode2.part.0+0xf5/0x400 [ 3590.149541][ T7463] tomoyo_encode+0x2b/0x50 [ 3590.153979][ T7463] tomoyo_realpath_from_path+0x19c/0x660 [ 3590.159634][ T7463] tomoyo_path_number_perm+0x1dd/0x520 [ 3590.165110][ T7463] ? tomoyo_path_number_perm+0x193/0x520 [ 3590.170769][ T7463] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3590.176594][ T7463] ? perf_trace_lock_acquire+0xf5/0x530 [ 3590.182167][ T7463] ? ___might_sleep+0x163/0x2c0 [ 3590.187175][ T7463] ? selinux_file_mprotect+0x620/0x620 [ 3590.192655][ T7463] ? __fget+0x37f/0x550 [ 3590.196835][ T7463] ? ksys_dup3+0x3e0/0x3e0 [ 3590.201269][ T7463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3590.207531][ T7463] ? fput_many+0x12c/0x1a0 [ 3590.211985][ T7463] tomoyo_file_ioctl+0x23/0x30 13:55:58 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x10200) r2 = open(&(0x7f0000002000)='./bus\x00', 0x400, 0x0) ftruncate(r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x7, 0x3, 0x8, 0x561e, 0x3}, 0xc) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000040)={0xc}) r5 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r5, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r5, 0x1) recvmmsg(r5, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x9, 0x201) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r8, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x40000000) [ 3590.216774][ T7463] security_file_ioctl+0x77/0xc0 [ 3590.221726][ T7463] ksys_ioctl+0x57/0xd0 [ 3590.225908][ T7463] __x64_sys_ioctl+0x73/0xb0 [ 3590.230530][ T7463] do_syscall_64+0xfa/0x790 [ 3590.235058][ T7463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3590.241002][ T7463] RIP: 0033:0x45af49 [ 3590.244944][ T7463] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:55:58 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000fb0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) [ 3590.264687][ T7463] RSP: 002b:00007f30d701bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3590.273117][ T7463] RAX: ffffffffffffffda RBX: 00007f30d701bc90 RCX: 000000000045af49 [ 3590.281106][ T7463] RDX: 0000000020000540 RSI: 0000000000004b46 RDI: 0000000000000003 [ 3590.290421][ T7463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3590.298428][ T7463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30d701c6d4 [ 3590.306420][ T7463] R13: 00000000004c43ba R14: 00000000004daf60 R15: 0000000000000004 13:55:58 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/171, 0xbb}], 0x33e, 0x0) [ 3590.354095][ T7463] ERROR: Out of memory at tomoyo_realpath_from_path. 13:55:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:58 executing program 4 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b46, &(0x7f0000000540)={0x0, "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"}) 13:55:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:58 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000001140)=""/171, 0x16c}], 0x10000000000001bf, 0xfffffffffffffffd) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@ipv4={[], [], @initdev}}, &(0x7f0000000100)=0x14) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0], 0x2}) r2 = getpgid(0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x3, 0x2, 0xff, 0x2400000000000, r2}) 13:55:58 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000e40300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x7800, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r9, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r11) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b46, &(0x7f0000000540)={0x0, "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"}) 13:55:58 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) unshare(0x24020400) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fb0\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) dup2(r2, r1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:55:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) [ 3591.148455][ T7788] x_tables: duplicate underflow at hook 1 13:55:59 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:59 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000040)=""/195, 0xc3}], 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000180)) 13:55:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x2, &(0x7f0000000540)={0x0, "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"}) 13:55:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet(0x2, 0x4040000000000001, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x10, &(0x7f0000000540)={0x0, "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"}) 13:55:59 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:55:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:55:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0xf000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:55:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:55:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x1279, &(0x7f0000000540)={0x0, "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"}) 13:55:59 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) getsockname$packet(r15, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) getsockname$packet(r19, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r17, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000200)={@loopback, 0x0}, &(0x7f0000000240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14, 0x80800) r23 = socket$alg(0x26, 0x5, 0x0) bind$alg(r23, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r23, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r24 = accept(r23, 0x0, 0x0) sendmmsg$alg(r24, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r24, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockname$packet(r24, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) r26 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r28 = dup(r27) getsockname$packet(r28, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', r29}) r31 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r33 = dup(r32) getsockname$packet(r33, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r31, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r34}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r35 = socket$alg(0x26, 0x5, 0x0) bind$alg(r35, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r35, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r36 = accept(r35, 0x0, 0x0) sendmmsg$alg(r36, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r36, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r36, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @empty}, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000640)=0xe8) r39 = socket$alg(0x26, 0x5, 0x0) bind$alg(r39, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r39, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r40 = accept(r39, 0x0, 0x0) sendmmsg$alg(r40, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r40, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockname$packet(r40, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000006c0)=0x14) r42 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r44 = dup(r43) getsockname$packet(r44, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r45}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r46 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r46, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r46, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r46, 0x1) recvmmsg(r46, &(0x7f0000005280), 0x2a5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r46, 0x8933, &(0x7f0000000700)={'vcan0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14) r49 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r49, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r49, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r49, 0x1) recvmmsg(r49, &(0x7f0000005280), 0x2a5, 0x0, 0x0) getsockopt$inet_mreqn(r49, 0x0, 0x62, &(0x7f0000000cc0)={@multicast2, @local, 0x0}, &(0x7f0000000d00)=0xc) r51 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r53 = dup(r52) getsockname$packet(r53, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r51, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r54}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r55 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r57 = dup(r56) getsockname$packet(r57, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r55, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r58}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000d80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40104010}, 0xc, &(0x7f0000000d40)={&(0x7f0000001280)={0x694, r3, 0x4465727604062c2, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8, 0x1, r20}, {0xc8, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x54, 0x4, [{0xff9f, 0x1, 0xcf, 0x3}, {0x3f, 0x80, 0x4, 0x33bbe46c}, {0x25, 0xbf, 0x4, 0x8}, {0x3, 0x81, 0x7, 0x100}, {0x7fff, 0x9, 0xc8, 0x1}, {0x8, 0x6, 0x4, 0x9}, {0x5, 0x20, 0x20, 0x80000001}, {0x0, 0x3b, 0x9a, 0x10000}, {0x2, 0x2, 0x20, 0x81}, {0x6, 0x9, 0xe0, 0x521c}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r30}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r34}, {0x288, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xf3b}}, {0x8, 0x6, r37}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r41}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5000}}, {0x8, 0x6, r45}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5c1c}}, {0x8, 0x6, r47}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xff, 0x1f, 0xff, 0x203cbee2}, {0x2, 0xff, 0x6e, 0x200}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r48}}}]}}, {{0x8}, {0x184, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r50}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r54}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r58}}}]}}]}, 0x694}, 0x1, 0x0, 0x0, 0x80011}, 0x4008040) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, 0x0) 13:56:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) recvmmsg(r8, &(0x7f0000005280), 0x2a5, 0x0, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:00 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000010600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4148, &(0x7f0000000540)={0x0, "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"}) 13:56:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0xd, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r8, 0x1) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:56:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, 0x0) 13:56:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4605, &(0x7f0000000540)={0x0, "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"}) 13:56:00 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000fa0e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:00 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) 13:56:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b2f, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x1f0, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, 0x0) 13:56:01 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000012800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:01 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r8, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:01 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b30, &(0x7f0000000540)={0x0, "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"}) 13:56:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0xe80, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@uid_lt={'uid<'}}]}) 13:56:01 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x40, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) 13:56:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b31, &(0x7f0000000540)={0x0, "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"}) 13:56:01 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) socket$inet(0x2, 0x4040000000000001, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:01 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@uid_lt={'uid<'}}]}) 13:56:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b32, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:01 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000040)={0x7fff, 0xfffffffc, 0x7, 0xffffffff, 0x5, 0x8}) 13:56:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r6 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r7) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r6, r7}}}], 0x20}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:56:02 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000003e400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b33, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x20000813, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:02 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000001140)=""/171, 0xab}, {&(0x7f0000000040)=""/193, 0xc1}, {&(0x7f0000000400)=""/186, 0xba}], 0x3, 0x0) 13:56:02 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@uid_lt={'uid<'}}]}) 13:56:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001740)=0xffffffffffffff8e) setreuid(0x0, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b34, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:02 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) 13:56:02 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r1, 0x0) sendfile(r0, r1, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000040)=""/141) r2 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) getpid() socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000001740)=0xffffffffffffff8e) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:02 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b35, &(0x7f0000000540)={0x0, "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"}) 13:56:02 executing program 5: r0 = mq_open(&(0x7f0000000200)='\b\xe2\x0f\xe7\xd5\xe58x\xe3~G\x87\xbc\xd1\x91\x9eT\xcc\xe6\xb7+\xd9\xfa\xf4u2Q\xad\x9b\xe2\xbdX\xa2\xe7\xbd\xad\x80\xc3\xaf\xe2\x8d\xfe*\xd3\xb9\x89o\xf3r\xdb\xd2\xa9\x81\x8c\xa5\xf3\xf2^\a\xab\x1c\xe4\x82\xe7@\xef`\xc5\x99y-\x9c|\xd5\x17\x8f8I\x15T\x9a-\xc8\x83yP\x95\xf5\xc6{\xb2\"2\xe5\x8c&wb\x18b\xba\xac\x9e\"\xe1\b4\x8b!9\xd6!\xf4M,\x1e\xff\x9f\xf3$\xec\xf4\v\x93A\xd8&\xc2\x9d;l\xd5\xedKe\xa8\x15w\xa4\x06\xdfj\xdb\xec%\xcfL\xa6\xa9\x85\xc8\xa7fE\xbd\xa7\xa2\xb5\xda\xe1aIw\xdf\xa7\xb5\xf3wR3B-\xce\x8f\xb4\x05\xb6IE\xe1H\xf5la\xab56\xca\x98\x04!\xae\x05\xde\x19d\xfe\x04\xf5\xe7\xe4\v', 0x42, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb58d2f45d50b80cd}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8c69b7af038a76ed}, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:03 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="000000000000000000000000000000000000000002fb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) getpid() socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:56:03 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b36, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) getpid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:03 executing program 5: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000005280), 0x2a5, 0x0, 0x0) preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/244, 0xf4}, {&(0x7f0000000780)=""/189, 0xbd}, {&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000280)=""/131, 0x83}, {&(0x7f0000000340)=""/190, 0xbe}, {&(0x7f0000000400)=""/217, 0xd9}, {&(0x7f0000000500)=""/70, 0x46}, {&(0x7f0000000580)=""/253, 0xfd}], 0x8, 0x0) 13:56:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x2, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b37, &(0x7f0000000540)={0x0, "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"}) 13:56:03 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:03 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/109}, {&(0x7f0000000240)=""/126}], 0x1000000000000228, 0x0) 13:56:03 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3a, &(0x7f0000000540)={0x0, "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"}) 13:56:04 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000040)={0x80}, 0x1) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0xf0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:04 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:04 executing program 5: r0 = mq_open(&(0x7f0000000040)='-$\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x0, [], [{0x8, 0x2, 0x7ff, 0x8, 0x7f, 0x4}, {0x4, 0x8000000, 0x1, 0x700, 0x16d7, 0x5}], [[], [], [], [], [], [], []]}) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3b, &(0x7f0000000540)={0x0, "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"}) 13:56:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:56:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3c, &(0x7f0000000540)={0x0, "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"}) 13:56:04 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000080), &(0x7f0000000180), 0x4, &(0x7f0000ffc000/0x3000)=nil, 0x5) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x2b7, 0x0) 13:56:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x105, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:04 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) accept(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:04 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) [ 3597.040941][T10238] x_tables: duplicate underflow at hook 1 13:56:04 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000000c0)=0x1f623334) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x3, 0x240080) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r2, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x38}}, 0x41) 13:56:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3d, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:05 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x501, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:05 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0x3714a3620c3503ec, &(0x7f0000000040)="6d8d370be26f85326c081aa4f89a2915a3b5e9a2948f91611bff1468d59ef82ff1f9b09ef3322472108830900ddfb5fa4577877af96024db64c356b809ec37cf7debde3ef5acad51b8200ba4e138682346a9b72f474614c960a059458276dc37506c1a29c755b62df70f9c9032018ad27eeb6da542bb7214f8765c9ebe496e005f184f162226d0f2a50a3e7b2589d501073e8c08b7d9b037b7f72859146af9a7ce9b5e38ba5f939235f2dd697e0548fad96807f21134678610d7b3da1f90bdb1c7fdd7da", 0xc4) 13:56:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000540)={0x0, "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"}) 13:56:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:05 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000001060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x3f00, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:05 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x3bb, &(0x7f00000007c0)={&(0x7f0000000780)=@getchain={0x24, 0x66, 0x96419197e6150a51, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x4}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="06000000", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e23, 0x3, @loopback, 0x3}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r3, 0x7, 0x1, 0x0, 0x35, 0x7}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r3, 0xdf10, 0x1ff, 0x6, 0x20, 0x200}, &(0x7f00000000c0)=0x14) preadv(r0, &(0x7f0000001240), 0x0, 0x3a) 13:56:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b41, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b44, &(0x7f0000000540)={0x0, "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"}) 13:56:06 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0x198}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r3 = accept(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r3, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x44, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) connect$unix(r3, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 13:56:06 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000001280000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x4000, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b45, &(0x7f0000000540)={0x0, "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"}) 13:56:06 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x20000224, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) r2 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f00000000c0)=""/119, &(0x7f0000000040)=0x77) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:06 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0xf000, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b48, &(0x7f0000000540)={0x0, "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"}) 13:56:06 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:06 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000003e40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:07 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x4a8820, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf25468f66c76c822}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x2, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20008445) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x105c00, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 3599.215348][T11288] x_tables: duplicate underflow at hook 1 13:56:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) 13:56:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0xff0f, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:07 executing program 5: syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0xfffffffffffffff7, 0x3b08a05766c2b7a9) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:07 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) 13:56:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be228e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c942d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76700022b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d692de75a183ff6d77b9a00"}) 13:56:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, &(0x7f0000000540)={0x0, "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"}) [ 3599.784352][T11519] x_tables: duplicate underflow at hook 1 13:56:07 executing program 5: getitimer(0x0, &(0x7f0000000040)) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4b, &(0x7f0000000540)={0x0, "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"}) 13:56:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<'}}]}) 13:56:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:08 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000002fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:08 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x20, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0xe, 0xf, 0x56, &(0x7f0000000040)="e94151b595d88ccc2ea1e8bb0695d5b21e869be5484d75f8788144d49b0845e9509fbfe4a319461c3fc8ca8ec54f80d7c97774c3c838b739eaa05f3ac6248123fc972826890db2274f8ec0d66da243eb73a8cbf96a0759598fce15c4d53e36d19820dfcb9e12c86615103281de89b22fbc8d7a87e8ff87471f6b2bff6f1113d9915955fa64cb7609e308543a20e72ca1fcb942ee738d3f94f38d3c78d304973478a16c0cd23dd1ed9e8ee4b262cf7dec7e7b84cb276a83fc81b96b42ddb7a405bd97a55e14d52e41ac7a4dac5755c7257f6eb8cfa479fe606c2e570a71ed2804b86aa2f2fe44d5171c4313878296d4b4eaafbf50a9d4c9ad370d5c822f0427a66e33f402fba242f1d8be2d28cdbeb6520bc9c09eb637dcd84e9c93549271d4876b1d1c424fbf87e7bd4a80fb06cf4bbf05fc0e09a6f42cf066eb90fd73676678ff5042dc549b07847ed7efd35ef25d7095fa295a57fa1bad62537bbff4a5936eb23fb9b8cd4c4ad8d7458a1e8f8eacda0cb3061c92f9e589852b143ca2e675a1276713ee19dc39e77663260e41979930df1a551ad153e8fce6ecd6e46ce3771d9474ce2317e9ed697b44646cefc9a1e68864840908c9cf52f01935a9206fc2a404b8173d1dc2fbdfc5bd9991dea82b0652f6c6b4f377474f2effdbf327c12e315d6402fc52450c2b6c429e19992d166ceec2515f29e4fb6b98ff787de65068203c1469bd15dcb060b785e612969c1f276ef84506628a7d58d1049ca22f1ae435d2cbe96232c0a9d34aad9a5a6cc4f22a767d1f263efd618b75c1f0ef8ac50f7103704e8c7f4e2ba36799afed319d8118de9ca6ecd4099349a7bb4924be42b746b2e7afbe33e3c7494f4a0f8255ca57b2f54d2401054244c25a1b192627d577fd7acb97a935d81524514fb9da8b23be3e199c2bdc27d0162487d69dec32c2ba96c70741df28837a378ba6c34486b0ceeac6606e392b70437d37900939aa269b39066830231cd130e463229a1433d29f7f327f40ff3ca50a1b4bf1bc08a3f282bc5fa8f12b806a812b588339fbda53622aeaa053768a92d9ffb8a9ba721d31618e0e5bcf249cfbd299f97cb2db4d643ce79cc0e0912899d9311922c7c4c93aa2ddbf135659dc90cc29d21fb0f4f8f64064a38b9b8edc30211602a1b80c4794c8aa94196f1d6b14147ecf884972865f7afa20c3c1f76148fc62b0c31cdef25944ef4cd29ea18f17fa6c08d5e316e27594c20f728566f60fbb16e5e29ea1f32952c3d0129073c18d29020ddb171ff672957dfa89d53e9d61c97c0fe14d2d41f19bbd8e5b7880772f5594fb77aafcdf8f335090f06298d94331dc8b0766b7e91a1f812980183c8575481ac3c2af99c85701a7ec0d84c31c015ab60f775e3dfba874c6e6456d59dc768c807e71fffea03d2261d6b5c3c27e686667182e67a6de5171f6"}) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r4 = accept(r3, 0x0, 0x0) open(&(0x7f0000000500)='\x00', 0x200802, 0x40) sendmmsg$alg(r4, &(0x7f0000000740)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="564004c6852da7a299e4c397614090d1a6e12edf1767f157", 0xfcdc}], 0x1, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb00}], 0x2}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 13:56:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x2000a0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:08 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x1, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fba4017f2346e61c94a6dbb3eb1f6db3d12631a22930968a939cb45af93427b12dd22b1b2451ed1d1b053058eed928235b4c86b656f1f51aa24428a63381cd1fcbd3194f17fc7dcac2b2290334f7362b3a750ea8d5000000ab86811005f3043cd2b526ceab4fd02beed5ef89edb3809b4fc43981db39971640cd5a89f9e58512571b9f0f58b9e87c428f9f778c19bd8526f6e4f78c930dfeadff64380881f44338ccc2"], 0xa4, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000140)="02d30f5335b3df494f398bc44b7dfcb8521c8d152c04dce80f5f1508d2bbffa57a534055069c0e4ae113378200369e4b889916", 0x33, r1}, 0x68) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x50, r3, 0x10000000) 13:56:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}]}) 13:56:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4c, &(0x7f0000000540)={0x0, "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"}) 13:56:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:08 executing program 5: mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000580)='/dev/snd/midiC#D#\x00', 0x7, 0xd1bae603df73beb6) r0 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000005280), 0x2a5, 0x0, 0x0) preadv(r0, &(0x7f0000000440), 0x0, 0x3) 13:56:08 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0xf0ffff, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4d, &(0x7f0000000540)={0x0, "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"}) 13:56:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}]}) 13:56:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4e, &(0x7f0000000540)={0x0, "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"}) 13:56:09 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000ff0f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b324953c0a9fa9a84450569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617b58c8108ddf12dddd4bfc6a4dd3a66eb22d312858f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff6357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f000000000000008068d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222406419860d4669df2dc9cc240e406bf0c5329bb4697336112b0b8754ce3574046bf611a108f8df4d1a88597850b702b6fa8edfff8faf8b8ec020bab36ccac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ecd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e7470f091bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x1000000, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "6695c3e7e9c00825189f5ef0acd3f12be4a190f671a54046adb89b4f4a2888fd7fc87ea23eb34dcd25d26cf78f99c3d7baca0decec8855afee6bd7aa4cdb828e386f1fb448578be208e902d6bf732e0f986295a1089be19a139c39af2322877bd04e3cec5c0078e35536cf6490678232adc220c6b25797c6282078c923d5b4d8a229e4cb69fcb5160272b3bdb30a9661f06a97580c1becaddefe2034dd2d6de8d2d03de54fb9ab0a2d935892663b4b63764c064443740f0f8d64e840a76780cd2b9e586170315fd7dae2ca2666ba97723d7886fdae500cded0c72271d8d89e2c03d755574f7a6cbba762b202f3c08a584f4a27c9a42f95cf7b03f4543e1ae0d955ae56ff81b594112b33d42c21a1826704585d97d2730995dd3f46e8dcddaa7a7c0a977d66ee1cdcd85ed174550c51fdc8e1b7849b406eba081c498d025f6bb1416daa5dffdc0d8592543734ad04f8159a35588f31feb2ba18410b8bc3f7db1b0e73ba99b78867cf537f7659d49c6d10f7220749a96bf64157acf367106f59eb8fbb42ec086fea24a99cc763c333a4f8790b4404a5ae55e15e63dacc2b10d959a629241443c1d152c0fc6817db5ad2cbc8092b8774229a483856a6fc933e9de3ecc5b8ed325c55a702d154e31ebd68106e7bc3930273dd5ae40ba6981bd41d707ae9ae667700e8ab698d52137caf5535904d2d3f7b4d692de75a183ff6d77b9a"}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, 0x0, 0x0) r3 = getpid() kcmp(0x0, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x0, 0x2, 0x8}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @dev, @dev={0xac, 0x14, 0x14, 0x18}, @port, @port=0x4e24}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@mcast1, @gre_key, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) statx(r2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x0, 0x0, 0x0, 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}]}) 13:56:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b52, &(0x7f0000000540)={0x0, "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"}) 13:56:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:09 executing program 5: r0 = mq_open(&(0x7f0000000000), 0x0, 0x108, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r2, 0xb703, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x8}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x57b2b6f12382c1c3, 0x2f]}}, 0x0, 0x33}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x4000, 0x111, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x5, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x2, 0x10, 0x77, 0x52}, &(0x7f0000000580)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x541a}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000002000)='./bus\x00', 0x8406d2538cca1f8d, 0x0) ftruncate(r8, 0x0) sendfile(r7, r8, 0x0, 0x800000000024) ioctl$NS_GET_NSTYPE(r8, 0xb703, 0x0) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f00000002c0)=""/22) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r6, 0x4000, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x6, &(0x7f0000000040)=@raw=[@ldst={0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x0, 0x2, 0x2, 0x2, 0x1, 0x18, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x9}, @exit, @exit], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x37773f62a08bd2c3, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000440)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, r5, r6}, 0x78) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x19, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x10001}, [@jmp={0x5, 0x1, 0x2, 0x8, 0x5, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85}, @generic={0x2, 0x7, 0x5, 0x4, 0x7ff}, @jmp={0x5, 0x0, 0xd, 0x7e4b68eb7c7dff04, 0x0, 0xfffffffffffffff4, 0x1}, @ldst={0x1, 0x1, 0x3, 0xa, 0x2, 0xffffffffffffffe0, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f0000000080)='GPL\x00', 0x78, 0x9e, &(0x7f00000000c0)=""/158, 0x41100, 0x0, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000180)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x6, 0x7f}, 0x10, r5, r9}, 0x78) 13:56:09 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000ff07000000000000000500000070050000c0020000b003000000000000b0030000c0020000a0040000a0040000a0040000a0044000a004000005000000", @ANYPTR, @ANYBLOB="0000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f00000000000000000000000000000000000000000000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000008000000000000000000000000000065006500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801d0010000000000000000000000000000000000000000000000009000737268000000000000000000000000000000000000000000000000000001620040020400000000000000000000000000ffffac1e0101162fd3f557825ec7a80dcf9bf4c4d117000000000000000000000000000000010000000000000000000000ffffffff0000000000ffffffffffffffff00000000ff000000ff0000ffff000000000000ff01084a000000000050006d756c7469706f727400000000000000000000000000000000000000000102064e204e244e234e204e234e234e234e224e214e244e224e224e244e244e230000000000010000010100000100010148004e45544d4150000000000000000000000000000000000000000000000000100000005f6e7d07a965e71bf6f92fdfe080785100000000000000000000ffffac14141f4e2400670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800f0000000000000000000000000000000000000000000000000004800534e41540000000000000000000000000000000000000000000000000001040000007f000001000000000000000000000000fe8000000000000000000000000000aa00670067fe880000000000000000000000000101fe8000000000000000000000000000aaffffffffffffffffa5eba8bfffffff00000000ff0000000000000000000000ff6970366772657461703000000000000073697430000000000000000000000000ff000000000000000000000000000000ff0000000000000000000000000000002b007f052100000000000000a800f00000000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000009733fbb3fc13cbe98e0a4c841e54a83b4e2304000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe"], 0x3) 13:56:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b60, &(0x7f0000000540)={0x0, "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"}) 13:56:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000000)={0x0, "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"}) 13:56:09 executing program 0: getitimer(0x0, &(0x7f0000000040)) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) 13:56:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x541b, &(0x7f0000000540)={0x0, "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"}) r1 = socket$inet(0x2, 0x4040000000000001, 0x0) bind$inet(r1, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @remote}, 0x10) shutdown(r1, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x4000, 0x113, 0x2000000, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1bf0969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) getpid() setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, 0x0, 0x0) r5 = getpid() kcmp(0x0, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r1, &(0x7f0000005280), 0x2a5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xd8, 0x1b0, 0x310, 0xd8, 0xd8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x70}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x32112ba8636f952d, @broadcast, @multicast2, @gre_key=0x2, @port=0x4e23}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x220, 0xf4, 0x1, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x87416bc9c41aa75, @rand_addr=0x8, @multicast1, @gre_key=0xebe, @icmp_id=0x66}}}}, {{@ip={@remote, @multicast2, 0x0, 0xff, 'batadv0\x00', 'ip6tnl0\x00', {}, {0x97b2b06a356e4868}, 0x67, 0x2, 0x8}, 0x0, 0x128, 0x160, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xb, 0x1, 0x1}}, @common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}, @ipv4=@empty}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0xc, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x18}, @port=0x4e20}}}}, {{@uncond, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1c, @ipv4=@loopback, @ipv6=@mcast1, @gre_key=0x4, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) statx(r4, &(0x7f0000000300)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x91, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="365df04134cb461b92fc859b5878d6efa4102d74ed32d26f76", 0x19, 0x3}, {&(0x7f0000000c80)="f9db09e170240559b0a22234efd4851429636fd574e3213150671cccfe74a6286c1d26019c30d38ac9a4bd0b372ac94c06d96fd504cf391e5bfcac7a60325159f87c267adc12f28a7517f29f29acb57f2998454553924a7750fbdc53cb83275745ec93256da00fccd914991a3d90ee0312a7c1c6e0770c9fc118fa5797ccb7e042fd3c3c74da20b2f143b01ca51e532d1a", 0x91, 0x1}], 0x2d000, &(0x7f0000000e40)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}, {@user_xattr='user_xattr'}], [{@uid_lt={'uid<', r6}}]}) 13:56:09 executing program 5: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000001140)=""/187, 0xbb}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) [ 3601.957582][T12472] ================================================================== [ 3601.957767][T12472] BUG: KASAN: global-out-of-bounds in fbcon_get_font+0x2b2/0x5e0 [ 3601.957784][T12472] Read of size 32 at addr ffffffff8873fc80 by task syz-executor.4/12472 [ 3601.957789][T12472] [ 3601.957807][T12472] CPU: 0 PID: 12472 Comm: syz-executor.4 Not tainted 5.5.0-rc6-syzkaller #0 [ 3601.957817][T12472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3601.957826][T12472] Call Trace: [ 3601.957847][T12472] dump_stack+0x197/0x210 [ 3601.957863][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.957887][T12472] print_address_description.constprop.0.cold+0x5/0x30b [ 3601.957901][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.957916][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.957932][T12472] __kasan_report.cold+0x1b/0x41 [ 3601.957951][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.957970][T12472] kasan_report+0x12/0x20 [ 3601.957988][T12472] check_memory_region+0x134/0x1a0 [ 3601.958003][T12472] memcpy+0x24/0x50 [ 3601.958020][T12472] fbcon_get_font+0x2b2/0x5e0 [ 3601.958041][T12472] ? display_to_var+0x7e0/0x7e0 [ 3601.958084][T12472] con_font_op+0x20b/0x1270 [ 3601.958099][T12472] ? mark_lock+0xc2/0x1220 [ 3601.958123][T12472] ? con_write+0xd0/0xd0 [ 3601.958148][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.958164][T12472] ? security_capable+0x95/0xc0 [ 3601.958186][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.958203][T12472] ? ns_capable_common+0x93/0x100 [ 3601.958223][T12472] vt_ioctl+0xd2e/0x26d0 [ 3601.958242][T12472] ? complete_change_console+0x3a0/0x3a0 [ 3601.958257][T12472] ? lock_downgrade+0x920/0x920 [ 3601.958275][T12472] ? rwlock_bug.part.0+0x90/0x90 [ 3601.958292][T12472] ? tomoyo_path_number_perm+0x214/0x520 [ 3601.958308][T12472] ? find_held_lock+0x35/0x130 [ 3601.958329][T12472] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3601.958348][T12472] ? tty_jobctrl_ioctl+0x50/0xd40 [ 3601.958364][T12472] ? complete_change_console+0x3a0/0x3a0 [ 3601.958384][T12472] tty_ioctl+0xa37/0x14f0 [ 3601.958405][T12472] ? tty_vhangup+0x30/0x30 [ 3601.958420][T12472] ? tomoyo_path_number_perm+0x454/0x520 [ 3601.958441][T12472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3601.958457][T12472] ? tomoyo_path_number_perm+0x25e/0x520 [ 3601.958477][T12472] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3601.958514][T12472] ? ___might_sleep+0x163/0x2c0 [ 3601.958539][T12472] ? tty_vhangup+0x30/0x30 [ 3601.958560][T12472] do_vfs_ioctl+0x977/0x14e0 [ 3601.958581][T12472] ? compat_ioctl_preallocate+0x220/0x220 [ 3601.958598][T12472] ? selinux_file_mprotect+0x620/0x620 [ 3601.958610][T12472] ? __fget+0x37f/0x550 [ 3601.958634][T12472] ? ksys_dup3+0x3e0/0x3e0 [ 3601.958653][T12472] ? ns_to_kernel_old_timeval+0x100/0x100 [ 3601.958679][T12472] ? tomoyo_file_ioctl+0x23/0x30 [ 3601.958697][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.958713][T12472] ? security_file_ioctl+0x8d/0xc0 [ 3601.958731][T12472] ksys_ioctl+0xab/0xd0 [ 3601.958751][T12472] __x64_sys_ioctl+0x73/0xb0 [ 3601.958773][T12472] do_syscall_64+0xfa/0x790 [ 3601.958796][T12472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3601.958809][T12472] RIP: 0033:0x45af49 [ 3601.958828][T12472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3601.958838][T12472] RSP: 002b:00007f30d701bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3601.958853][T12472] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 3601.958863][T12472] RDX: 0000000020000540 RSI: 0000000000004b60 RDI: 0000000000000003 [ 3601.958872][T12472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3601.958881][T12472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30d701c6d4 [ 3601.958890][T12472] R13: 00000000004c43ba R14: 00000000004daf60 R15: 00000000ffffffff [ 3601.958915][T12472] [ 3601.958921][T12472] The buggy address belongs to the variable: [ 3601.958998][T12472] fontdata_8x16+0x1000/0x1120 [ 3601.959003][T12472] [ 3601.959009][T12472] Memory state around the buggy address: [ 3601.959024][T12472] ffffffff8873fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3601.959042][T12472] ffffffff8873fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3601.959056][T12472] >ffffffff8873fc80: fa fa fa fa 06 fa fa fa fa fa fa fa 05 fa fa fa [ 3601.959061][T12472] ^ [ 3601.959072][T12472] ffffffff8873fd00: fa fa fa fa 06 fa fa fa fa fa fa fa 00 00 03 fa [ 3601.959082][T12472] ffffffff8873fd80: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 [ 3601.959088][T12472] ================================================================== [ 3601.959093][T12472] Disabling lock debugging due to kernel taint [ 3601.993021][T12472] Kernel panic - not syncing: panic_on_warn set ... [ 3601.993045][T12472] CPU: 0 PID: 12472 Comm: syz-executor.4 Tainted: G B 5.5.0-rc6-syzkaller #0 [ 3601.993053][T12472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3601.993059][T12472] Call Trace: [ 3601.993080][T12472] dump_stack+0x197/0x210 [ 3601.993100][T12472] panic+0x2e3/0x75c [ 3601.993116][T12472] ? add_taint.cold+0x16/0x16 [ 3601.993132][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.993150][T12472] ? preempt_schedule+0x4b/0x60 [ 3601.993168][T12472] ? ___preempt_schedule+0x16/0x18 [ 3601.993185][T12472] ? trace_hardirqs_on+0x5e/0x240 [ 3601.993205][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.993221][T12472] end_report+0x47/0x4f [ 3601.993233][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.993247][T12472] __kasan_report.cold+0xe/0x41 [ 3601.993261][T12472] ? fbcon_get_font+0x2b2/0x5e0 [ 3601.993275][T12472] kasan_report+0x12/0x20 [ 3601.993290][T12472] check_memory_region+0x134/0x1a0 [ 3601.993303][T12472] memcpy+0x24/0x50 [ 3601.993317][T12472] fbcon_get_font+0x2b2/0x5e0 [ 3601.993332][T12472] ? display_to_var+0x7e0/0x7e0 [ 3601.993349][T12472] con_font_op+0x20b/0x1270 [ 3601.993360][T12472] ? mark_lock+0xc2/0x1220 [ 3601.993380][T12472] ? con_write+0xd0/0xd0 [ 3601.993402][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.993418][T12472] ? security_capable+0x95/0xc0 [ 3601.993438][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.993455][T12472] ? ns_capable_common+0x93/0x100 [ 3601.993470][T12472] vt_ioctl+0xd2e/0x26d0 [ 3601.993485][T12472] ? complete_change_console+0x3a0/0x3a0 [ 3601.993498][T12472] ? lock_downgrade+0x920/0x920 [ 3601.993513][T12472] ? rwlock_bug.part.0+0x90/0x90 [ 3601.993531][T12472] ? tomoyo_path_number_perm+0x214/0x520 [ 3601.993544][T12472] ? find_held_lock+0x35/0x130 [ 3601.993563][T12472] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3601.993579][T12472] ? tty_jobctrl_ioctl+0x50/0xd40 [ 3601.993592][T12472] ? complete_change_console+0x3a0/0x3a0 [ 3601.993610][T12472] tty_ioctl+0xa37/0x14f0 [ 3601.993627][T12472] ? tty_vhangup+0x30/0x30 [ 3601.993643][T12472] ? tomoyo_path_number_perm+0x454/0x520 [ 3601.993661][T12472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3601.993677][T12472] ? tomoyo_path_number_perm+0x25e/0x520 [ 3601.993695][T12472] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3601.993716][T12472] ? ___might_sleep+0x163/0x2c0 [ 3601.993734][T12472] ? tty_vhangup+0x30/0x30 [ 3601.993749][T12472] do_vfs_ioctl+0x977/0x14e0 [ 3601.993764][T12472] ? compat_ioctl_preallocate+0x220/0x220 [ 3601.993778][T12472] ? selinux_file_mprotect+0x620/0x620 [ 3601.993789][T12472] ? __fget+0x37f/0x550 [ 3601.993805][T12472] ? ksys_dup3+0x3e0/0x3e0 [ 3601.993821][T12472] ? ns_to_kernel_old_timeval+0x100/0x100 [ 3601.993840][T12472] ? tomoyo_file_ioctl+0x23/0x30 [ 3601.993855][T12472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3601.993869][T12472] ? security_file_ioctl+0x8d/0xc0 [ 3601.993884][T12472] ksys_ioctl+0xab/0xd0 [ 3601.993900][T12472] __x64_sys_ioctl+0x73/0xb0 [ 3601.993919][T12472] do_syscall_64+0xfa/0x790 [ 3601.993937][T12472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3601.993949][T12472] RIP: 0033:0x45af49 [ 3601.993966][T12472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3601.993975][T12472] RSP: 002b:00007f30d701bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3601.993998][T12472] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 3601.994008][T12472] RDX: 0000000020000540 RSI: 0000000000004b60 RDI: 0000000000000003 [ 3601.994016][T12472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3601.994025][T12472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30d701c6d4 [ 3601.994035][T12472] R13: 00000000004c43ba R14: 00000000004daf60 R15: 00000000ffffffff [ 3601.995495][T12472] Kernel Offset: disabled [ 3602.821044][T12472] Rebooting in 86400 seconds..