program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 654.451211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 05:05:54 executing program 5: r0 = socket$inet(0xa, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x29, 0x36, 0x0, 0x300) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) 05:05:54 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xdd05) 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 05:05:54 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001800010000000000000000020a000000000000000000000006001500060000000c001680040003000000e500"], 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r3, 0x3305) r4 = socket(0x2, 0x3, 0xb) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) getpid() (async) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001800010000000000000000020a000000000000000000000006001500060000000c001680040003000000e500"], 0x30}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$SNAPSHOT_FREE(r3, 0x3305) (async) socket(0x2, 0x3, 0xb) (async) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)) (async) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) (async) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) (async) 05:05:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000110001"], 0x1c}}, 0x0) [ 654.672057] Restarting kernel threads ... done. 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 05:05:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="110000001a000102"], 0x1c}}, 0x0) 05:05:54 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 05:05:54 executing program 5: r0 = socket(0xa, 0x3, 0x87) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)={'ipvlan1\x00'}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x2) [ 654.760526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:54 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff) 05:05:54 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f00000009c0)='.log\x00', 0x0, 0x0) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 654.864035] Restarting kernel threads ... done. 05:05:54 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) 05:05:54 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r3, 0x3305) sendto$inet(r2, &(0x7f00000001c0)="7fdbe16714fc06e149563c9197ab72f47e435cceb2efd061dba4786a49cb5c6937fbe7b913a5db69bea9362fd78c4046e3fc25569fcdc4f218368c9d0a9bf96f210fec3a465f0f98f0b9b45c18690b8e4b7095945685fb70045efc25df38a0ac28ece1880616014dad6813ace342a76900d0b9531dfda6ee34c2948820999eca3236c35f7f1552704f0c12aceda241f33aecbecaebe81841", 0x98, 0x10, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010102}, 0x10) r4 = socket(0x2, 0x3, 0xb) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) 05:05:54 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f) 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3) [ 654.940257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 654.972415] Restarting kernel threads ... done. 05:05:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f000000d880)='mounts\x00') read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xfeff0000}, 0x0) 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4) 05:05:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') read$FUSE(r0, 0x0, 0x0) 05:05:54 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffe) 05:05:54 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6) 05:05:54 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xff0f0000}, 0x0) [ 655.147839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:55 executing program 5: r0 = socket(0xa, 0x3, 0x43) connect$vsock_stream(r0, &(0x7f0000002140)={0x28, 0x0, 0x0, @host}, 0x10) 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x34000) 05:05:55 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r3, 0x3305) sendto$inet(r2, &(0x7f00000001c0)="7fdbe16714fc06e149563c9197ab72f47e435cceb2efd061dba4786a49cb5c6937fbe7b913a5db69bea9362fd78c4046e3fc25569fcdc4f218368c9d0a9bf96f210fec3a465f0f98f0b9b45c18690b8e4b7095945685fb70045efc25df38a0ac28ece1880616014dad6813ace342a76900d0b9531dfda6ee34c2948820999eca3236c35f7f1552704f0c12aceda241f33aecbecaebe81841", 0x98, 0x10, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010102}, 0x10) r4 = socket(0x2, 0x3, 0xb) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) getpid() (async) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) ioctl$SNAPSHOT_FREE(r3, 0x3305) (async) sendto$inet(r2, &(0x7f00000001c0)="7fdbe16714fc06e149563c9197ab72f47e435cceb2efd061dba4786a49cb5c6937fbe7b913a5db69bea9362fd78c4046e3fc25569fcdc4f218368c9d0a9bf96f210fec3a465f0f98f0b9b45c18690b8e4b7095945685fb70045efc25df38a0ac28ece1880616014dad6813ace342a76900d0b9531dfda6ee34c2948820999eca3236c35f7f1552704f0c12aceda241f33aecbecaebe81841", 0x98, 0x10, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010102}, 0x10) (async) socket(0x2, 0x3, 0xb) (async) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)) (async) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) (async) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) (async) 05:05:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x14}, 0x14}}, 0x0) 05:05:55 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x7) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40000) 05:05:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000820001"], 0x1c}}, 0x0) [ 655.325037] Restarting kernel threads ... done. 05:05:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400300) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 05:05:55 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8) 05:05:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x572}]}) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 655.523799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:55 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r3, 0x3305) (async) sendto$inet(r2, &(0x7f00000001c0)="7fdbe16714fc06e149563c9197ab72f47e435cceb2efd061dba4786a49cb5c6937fbe7b913a5db69bea9362fd78c4046e3fc25569fcdc4f218368c9d0a9bf96f210fec3a465f0f98f0b9b45c18690b8e4b7095945685fb70045efc25df38a0ac28ece1880616014dad6813ace342a76900d0b9531dfda6ee34c2948820999eca3236c35f7f1552704f0c12aceda241f33aecbecaebe81841", 0x98, 0x10, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010102}, 0x10) (async) r4 = socket(0x2, 0x3, 0xb) setsockopt(r4, 0x0, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r5, r6+60000000}) (async) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) 05:05:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffff) 05:05:55 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 05:05:55 executing program 4: r0 = socket(0xa, 0x3, 0x43) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 655.642622] Restarting kernel threads ... done. [ 655.658787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x0, 0xa3b, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x48) 05:05:55 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000580)=@bloom_filter={0x1e, 0x81fa, 0x6, 0x9, 0x506, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000001580)=ANY=[@ANYBLOB="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", @ANYRES8=r0, @ANYBLOB="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"], &(0x7f0000000680)='syzkaller\x00', 0x9, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x22020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='rpc_pipefs\x00', 0x4, 0x0) unshare(0x40020000) rmdir(&(0x7f0000000740)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x4000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x6589}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000300)=0xc) unshare(0x200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xe3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000006c0)=[@text32={0x20, &(0x7f0000000600)="b9e50200000f32c4c27d1c69e70f01d113649e3e9e3ec478970f0000000500000500c00f3235004000000f30660f38807a8eb88000c0fe9d350000c0000f23f80fc75c1af3393d000000000fc77180", 0x4f}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x39}, 0xffffffff, 0xffffff00, 0x2, 0x5, {@empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}}, 0x6, 0x8, 0x2, 0x8000, 0x101, 0x200, 'ipvlan0\x00', 'pimreg0\x00', {}, {0xff}, 0x0, 0xc}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @local, 0x1}}}, {{@arp={@remote, @empty, 0xffffff00, 0x0, 0x5, 0x9, {@empty, {[0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, 0x1f, 0x2736, 0x8, 0x9, 0xfff7, 0x3, 'wg2\x00', 'hsr0\x00', {}, {0xff}, 0x0, 0x8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x12}, 0x2, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000e40)={0x0, 0x0, @ioapic}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{}, {0x77359400}}, &(0x7f0000000280)) 05:05:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000) [ 655.763718] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 05:05:55 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040), 0x8) [ 655.898547] Restarting kernel threads ... done. 05:05:55 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x2000000) 05:05:55 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc) 05:05:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=@ipmr_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 05:05:55 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r6, r7+60000000}) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, 0xffffffffffffffff, 0x8000, '\x00', r9, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b40)={r8, 0xffffffff}, 0xc) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r12, 0x58, &(0x7f0000000440)}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r13, 0x58, &(0x7f0000000440)}, 0x10) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001bc0)={&(0x7f0000001b80)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x2, &(0x7f0000001980)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r10}], &(0x7f00000019c0)='syzkaller\x00', 0x1ff, 0x9d, &(0x7f0000001a00)=""/157, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0xc, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c00)=[0xffffffffffffffff, 0xffffffffffffffff, r11, r12, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff]}, 0x80) r15 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r16 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r16, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, r15, 0x8000, '\x00', r17, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000003dc0)=ANY=[@ANYBLOB="203900002d0000012cbd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r17, @ANYBLOB="080002008f00000008000100ffff0e0008000300dc00000006000500003f0000080091a03d2f400b00a50000000b000100666c6f77657200002c0002000500450000000000050049000600000005003d0004003d0006005c000600000008000d00ffffff00"], 0x3920}, 0x1, 0x0, 0x0, 0x20008080}, 0x4040081) 05:05:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000680)="ed7e337c95a9964342c958df5896c650", 0x10) 05:05:55 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x2) [ 656.093812] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 656.158217] Restarting kernel threads ... done. [ 656.189099] IPVS: ftp: loaded support on port[0] = 21 05:05:56 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000580)=@bloom_filter={0x1e, 0x81fa, 0x6, 0x9, 0x506, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000001580)=ANY=[@ANYBLOB="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", @ANYRES8=r0, @ANYBLOB="be378e71a7d07c00a86c47a145aa069ffb5b7f153f634b683fe05332000000edffffff000008001e00000000004335da41bcad9b9eca1fc0968f6abff703559707eda71424d0b3b692992ac51c04792ce7b2e8bb0e291d475b5fdf56e1b9a78af0bf580a922f7fce7f6f93e609ea043807000000000000864caccd5edb015a450000000000000000000000000000b225994e12a7aaebf17d0d29f5c8d54e0aa7c78fa5a1554608f0233c90fb892dbe3a8e25c13a47a7f454331e0d9070a1e64b0b3acccd2810d643ab13f3c2b05b166cded98ce8b8cbe58586f6965d88dfe049382d257dcef1cdf8e84dde4894c5292ddd5a1b9b334f3a9b45b63f2210de32f4d2e06ce97c25a071d5523001802eaaa2bd0a2564768548467bf8911b25ed709d2e000000000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x9, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x22020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='rpc_pipefs\x00', 0x4, 0x0) unshare(0x40020000) rmdir(&(0x7f0000000740)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x4000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x6589}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000300)=0xc) unshare(0x200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xe3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000006c0)=[@text32={0x20, &(0x7f0000000600)="b9e50200000f32c4c27d1c69e70f01d113649e3e9e3ec478970f0000000500000500c00f3235004000000f30660f38807a8eb88000c0fe9d350000c0000f23f80fc75c1af3393d000000000fc77180", 0x4f}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x39}, 0xffffffff, 0xffffff00, 0x2, 0x5, {@empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}}, 0x6, 0x8, 0x2, 0x8000, 0x101, 0x200, 'ipvlan0\x00', 'pimreg0\x00', {}, {0xff}, 0x0, 0xc}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @local, 0x1}}}, {{@arp={@remote, @empty, 0xffffff00, 0x0, 0x5, 0x9, {@empty, {[0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, 0x1f, 0x2736, 0x8, 0x9, 0xfff7, 0x3, 'wg2\x00', 'hsr0\x00', {}, {0xff}, 0x0, 0x8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x12}, 0x2, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000e40)={0x0, 0x0, @ioapic}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{}, {0x77359400}}, &(0x7f0000000280)) 05:05:56 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe) 05:05:56 executing program 5: r0 = socket(0xa, 0x3, 0x43) sendto$packet(r0, 0x0, 0x0, 0x7, 0x0, 0x0) 05:05:56 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3000000) 05:05:56 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3) 05:05:56 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) (async) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r6, r7+60000000}) (async) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, 0xffffffffffffffff, 0x8000, '\x00', r9, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) (async) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b40)={r8, 0xffffffff}, 0xc) (async) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r12, 0x58, &(0x7f0000000440)}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r13, 0x58, &(0x7f0000000440)}, 0x10) (async) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001bc0)={&(0x7f0000001b80)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x2, &(0x7f0000001980)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r10}], &(0x7f00000019c0)='syzkaller\x00', 0x1ff, 0x9d, &(0x7f0000001a00)=""/157, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0xc, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c00)=[0xffffffffffffffff, 0xffffffffffffffff, r11, r12, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff]}, 0x80) (async) r15 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r16 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r16, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, r15, 0x8000, '\x00', r17, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) (async) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000003dc0)=ANY=[@ANYBLOB="203900002d0000012cbd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="f2ffe0ff0f000d00020010000800010075333200680002001400080073797a6b616c6c65723100000000000008000b0004000000140008006e657464657673696d3000000000000008000b0000000000080002000400000008000b000300000008000300ff030000140008006272696467655f736c6176655f30000006000500fe20000008000b0002000000060005000000000008000b00050000000a0001007273767036000000e41f0200cc1f0600c81f1a000b000100706f6c6963650000c01e028004040300020000000800000042a0000000fcffffff0f0000080000009904000000080000040000001f00000068c9000009000000490f00000000000004000000a2dd2b27040000002200000001000000090000000100000080000000ffffffff000000000100000033000000040000000600000004000000070000000200000000001c006f9f00000600000001000000040000000000000006000000ff7f00002000000005000000200000006e05000001800000fcffffffff7f00000400000040000000010000000300000001800000ffffff7f0400000001010000000400000600000001010000040000006ea3647a090000000500000000000000ff0f0000080000000800000001000000010000000000000002000000ffffffff090000000700000009000000030000000900000006000000020000000000010000800000004000002000000003000000050000000004000001000000030000000300000000000000bb350000ff0700000180000002000000060000000000005c0400000093db00001f000000970e000001000000000200000500000001000000077c00000300000008000000020000008700000002000000a200000000000007c103000001000000018000003f000000270e00000104000001800000ff0000000600000000080000be00000008000000000000000100000001000000080000000100000001000100001000000800000001000000090000000400000005000000090000008f00000056030000010001001f000000ff0700000800000000010000d5050000010000007f000000010000003f000000000001006b030000c690d2670200000000000000c63300000700000002000000080000000200000008000000ec99a17d05000000000000000400000000040000000b7a0602000000000000007f0000001a7700000000000003000000d6f0ffff010000802dc000000800000003000000ff0f00007900000000000000080000000700000003000000030000000200000003000000ffffffff01000000000000000100000007000000b07a0000050000000100ffff08000000ffffff7f06000000d51500000180000076f7fffffcffffff32030000e40600000700000001040000c70b000000080000060000000800000000000000ffffff7f40520000000001000000008005000000e32b0000030000004000000004000000000800008c000000ffffff7f0004000001000100060000000600000008000000070000000004000005000000630a00000400000003000000010000002e81ffff0100000020000000ff7f0000ffff000000010000020000006f0d000003000000050000004e00000006000000a90c000007000000700600008100000002000000dd00000003000000010000000080000079000000dd000000020000000404020001000000ff070000040000004e570000000000000600000007000000050000000400000004000000010000000004000084f800000600000006000000030000000600000000000000040000005d913262f80700000004000004000000050000000413c348ff010000080000000800000000800000080000000100000080000000ff7f000005000000ffff000049f8ffffc1ffffff00000100070000000900000012200000cfbc0000070000000400000001000000ff01000004000000050000004fdd00000500000000000000ff01000003000000580000008100000060000000000000000400000027910000040000000000000003000000579360021f00000006000000daf5ffffd300000003000000f402000006000000020000000400000006000000050000002b79000003000000000800001f0000003600000000000080ffff0000810000000300000006000000400000000400000004000000010100000600000000000000090000000800000005000000000100000010000009000000030000000000000003000000000200000004000045020000070000000800000000040000010000000900000001010000c4186e7b030000000400000001800000d400000001000000040000007f00000009000000059200000500000004000000070000003f000000040000000800000008000000010000001faa000058080000010100003f0000000400000005000000050000003a0000000100000006000000010400000100000002000000090000001dc1000001000000000000002500000009000000060000000000000002000000020000000900000006000000583a2a410100000001040000480000000200000008000000050000003cde0000b70000001f00000008000000090000000700000000080000010100008200000000000000ff0300000500000006000000070000007f0000007bec0000070000000600000008000000fdffffff010001000900000021060000030000000500000003000000ffffffff05000000000100000400000003000000fb00000003000000000001000000000801000000ff0700000100000009000000000200000800000020000000ffffffff06000000b00f00004c000000d2020000040000000d00000008000000ffffff7f0000010002000000959f00000500000006000000070000000200000005000000ff00000002000000ff070000000000004a44000005000000c5aa00000104000004000000ffffffff00040000ad0e00000300000005000000ff07000001000000000000000f000000ffffff7f0000000000000000000200000800000080000000903d00000800000000ffffffffffffff030000000f0600000400000006000000090000007c040000ff0000000001000007000000d8040000ef0300003c000100445affff050000007c00000000000000d2ffffff0301ff0046ce0400900a00001f000104000005007fffffff01f0ffff04000000040000003c0001000100010038b7962f0700000001000100090000003f010200420d4000ffffff7f50000800040020000400000007000000ffffff7f0400000008000500050000000c000800f7ffffffffffffff3c0001000000000000000000f7000000080000000104000008010400ff7f39a0010000000201f7ff8000040000000000ffffffff07000000ff7f00000404020003000000060000009aec000008000000fe000000ff00000003000000000000007f00000000000080050000000000008000800000000000000000000009000000018000000600000002000000ffffff7f00000000b60000000100000004000000ffffff7f050000000600000040000000cd50000004000000090000000500000001000000fdffffff06000000070000000100000004000000000024000400000001000000010000000800000000100000ff030000ff0f0000090000000300000007000000030000003309000008000000f90d00000000000000000080a800000003000000fb2e0000070000000080000004000000000000000800000001000100dc5200007f000000cedeffff0080000002000000ff7f0000030000000400000001000100d22f000080000000080000007f00000008000000ff000000020000000100000000000100070000000180000005000000060000000100000022080000050000006e01000007000000060000000100000005000000030000000400000002000000200000000300000001000000010000007607000009000000060000000104000004000000090000004e020000000000005602000007000000ff03000034070000ff00000081000000ff0f0000008000000300000003000000b100000020fc00001f00000006000000010000000000008006000000ff7f000062000000000000000800000000e0000002000000090000007f000000050000000100008003000000ffff0000a8000000030000001f0000000180000008000000008000003f0000008557db640900000005000000030000000700000009000000020000000000004004000000ffffffff01000000ffff000008000000c59f0000000000000400000067000000b8000000c700000002000000040000000200000000000000010000007f00000005000000020000000900000003000000ffffff7f04000000ff7f0000ff0100000000000000000000cc0000000000000008000000ffff000000000000070000008f0a0000000001000200000004000000080000009b640000030000000900000007000000e600000007000000d50b00001757ac7e06000000ff0000000700000000080000040000000100000002000000010000005d00000005000000ff7f0000070000001995000003000000060000000400000005000000e6090000060000000900000004000000ff0700000800000000fcffff81000000fbffffff2000000000100000930d000001000000000000000300000003000000f7ffffff000000000800000007000000030000000000000005000000ff01000006000000ff07000005000000890000000700000003000000c930000000000000d639000003000000018000000200000001010000ffffffff01000080000000003c00010071bf00000400000085d2ffffff010000080000000900000202002d02b6d200008001f90002000400090000001f000000feffffff200000003c000100000000000500000000020000f4000000040000000401ac00010002001a0b0000000000c0040003000300000007000000d7800000040000000c0009001f000000000000003c000100780e000000000020ffffffff04000000018000003f02f8ff05000400fafffffffd0193040200ff7f3f000000050000002c190000bb0200000c00090020000000000000000800050000010000080005000500000008000500fbb307400c000900f00300000000000008000400000001000404020008000000050000000800000002000000a2df0000010400000800000001000000050000001f0000000101000000000000ffffff7f01000000030000000d0e000005000000803e00000500000017050000010000008000000000000000dfc400000700000000000000010400000100000000000000090000000900000008000000ff0f000080df0000070000000600000006000000080000005b0a0000010001000000000101ffffff0100008001000080000000000700000008000000000000000400000001000100060000000000a8ff0000000000010000000000005b0300002c00000000feffff03000000070000000300000081ffffffc5000000080000000700000004000000ffffff7f070000000800000000080000ff7f0000010000000100ffff08000000ffff00000600000009000000fd0900000002000000020000fd620000ff070000d902000086040000000000801000000000000000ec8c000081ffffff4000000005000000070000000004000004000000550200000000000090f8644c09000000ff0f0000070000000008000020000000f93400006300000002000000ff0f0000e14effff4f000000008000000100000002000000080000000300000001000000070000000500000006000000020000000500000006000000ff00000001000000fcffffff76000000d60c000000040000fcffffff00000c0082710000a80000000100000000000000ffff0000070000000200000002000000810000000000000016ea0000ff070000060000001f23021c00010000f0831c2108000000060000000200000009000000ff0f00000700000005000000040000000400000020000000ace36962385500000600000000000000830000007eeb6610800000000800000085da0000010000005eda1ea90100000078000000008000000400000000020000070000000f00000047af0000060000007f00000009000000d7fc0000ff0f00000002000005000000784c0000000800000080000005000000070000000700000002000000f27c00000300000007000000020000009465000004000000080000004002000000000000faffffffff030000018000000500000000010000ffffff7f030000000500000001000000b900000016b900000800000005000000c438000002000000000800000008000080000000000000000400000000000000ffffff7f4f270000000800000800000001000000ffffffffff7f00000180000005000000e7000000000000003f000000855d0000ff03000000005008020000000100000003000000080000000100000040000000070000000600000004000000f7ffffff0400000000000100f7ffffff7d090000020000000400000008000000ffff000002000000000000000100000005000000ff01000093000000080004007c0000000c0008000200000000000000040402003f0c0000090000000600000000010000ffffff7f0080000006000000080000000300000001800000040000000100000007000000000200007f00000001000000050000000000000001000000040000000700000001000000070000007f0000000100000003000000000001000000000072d800000400000005000000ff0000000600000002000000020000000000000080000000070000000700000000000000000000000104000009000000001000003f0000000001000000080000ff000000010400000800000008000000010100000000000002000000ff7f00002000000003000000070000000000000005000000060000000000010002000000060000003f00000001000000ff070000000400000800000091000000020000000008000005000000fdffffff05000000050000005803000009000000000000000002000008000000b4cb0000020000000700000005000000070000001f000000a05fb235030000000800000008000000050000000001000002000000080000005b000000ffffff7f0100000001000000ff070000baa80000a50e000007000000ff030000c00700000180000001010000ffff000000040000810000000700000001010000830e000003000000070000000300000000000000000300005f0000008100000008000000050000003f00000080000000ff0000000004000009000000050000003f00000001010000ffffffff0600000001000000f80800001f0000000500000009000000ffff00000c0200000600000002000000080000001f0000001f000000040000008000000004000000010000000001000008000000080000008906000009000000530000000500000003000000d50000000200000074000000ff0700000100000000000080050000000600000000000000010000000000000007000000ffffff7f060000000c3b0000ff0f00000400000018060000030000000900000006000000ff00000001000080360c000006000000000000000800000006000000ff0f000000000000090000000700000004000000985b000009000000ff0000000800000008000000040000000000000007c900000600000000000100e8710000800000000000000007000000782500000100ffff8e09000001040000d20000000000000000800000030000000000010002680000f732000080000000ff010000050000000500000001000000030000000100000007000000010000000000008006000000030000000180000004000000d7000000040000003f000000a204000006000000000000000900000009000000010001000900000004000000010001003f00000001000000030000000002000000040000e7d972010500000005000000200000000000000000000100f8ffffff0900000000000000080000000000000008000400ffffff7f0c000800ccc5ffffffffffff08000400280000000c00080008000000000000000c0008000000004001000000040403000100000008000000b7070000030000000000010000080000080000000200000003000000acca000026e700000100000006000000380e0000ff030000cc040000040000000dcbffffb10000000500000000100000ffffff7f0500000092660000ff0000009c000000e64a0000010000800800000080000000c70b00001f0000000500000001000000080000000200000003000000000000000000000522000000ffffffffe900000000800000ff000000060000004b8e00000600000002000000f7ffffff000000000600000004000000000000000400000008000000000000000700000005000000060000000500000009000000ff010000000400001f000000060000004d010000000000e00000010000000080020000000400000002000000d3000000ffffffff0400000007000000090000000800000004000000010000000300000006000000040000000100000000000000ffffffff03000000070000000400000001000000b8000000000200000600000001000000040000007f00000000010000000001002f0000000500000000800000080000002c030000ff00000006000000ff0100000300000003000000060000006302000003000000070000006a080000080000007f0000000400000000080000ff0000000200000001040000090000003f00000008000000040000000600000020000000e1ffffff07000000a08300000800000004000000ab420000ff010000f48100000200000003000000ff7f00000300000008000000030000008100000004000000faffffffff0100004000000000c0ff030100000007000000190a00003f000000e40000000a0e00000200000008000000470300000400000081000000b8b49f1200000000000004000700000001000000730b0000ff07000007000000070000000500000006000000008000007f0000000100000009000000070000000000008001000080360b0000060000006e080000f7ffffff6a0200008100000008000000670f0000ade90000ff00000001000000feffffff0300000007000000330f0000060000000b000000050000000700000040000000ffffffff07000000050000000900000003000000ff0300000a3951357100000007000000fbffffff09000000e195000001ffffffff0100000400000008000000080000000400000035a3000007000000080700006d0900005a0000000700000007000000c0ffffff001000000104000029b10000018000000200000003000000060000000800000000800000fbffffff2537c8783f00000000000100080000000000000002000000000000000700000001000000ff010000f837000003000000360f0000070000008200000003000000ff0f0000950000000300000000010000fcfffffff90000008000000000000000070000003c00010007000000fdffffef0600000002000000018000000101d237f7ff0900090000005d0065050300020001000000d4000000000000000400000008000400040000000c000900ff0f00000000000004040300080000000900000000800000020000000600000005000000040000000700000000000000f8ffffff000800000300000000000000010000000100010003000000ab000000000800003f000000010000800300000008000000000200000080000000000000810000000000008007000000090000000300000000000000000800000180000005000000850d00003093bd3e03000000040000000004000009000000ff0000000400000004000000d60000000008000038c50000ff7f0000fffffeff08000000008001001f0000000400000002000000c1000000090000001af40000ec33000000002000020000000100000002000000000000000300000020000000080000009f2200000700000000000080cd7f0000080000000000000008000000ba070000ad0300000800000009000000000000055500000008000000ff010000ff030000fcffffffff000000001000000500000083950000ff0f000004000000ff7f00000100000000020000350000000900000008000000468a0000720000000800000003000000000400000900000006000000060000000600000072030000200000009a020000ff070000d24e0000020000005600000003000000020000000101000000080000800000004e0400000900000005000000ffffffff0000000001000000fcffffffffffffff0800000002000000010000000300000000000080eb0e000001000080010000000100000008000000ff7fffff09ffffff00020000ff03000001000000a85000000600000009000000ff7f00000500000002000000faffffff0300000096170000090000004a000000fbffffff010000001a00000009000000ff01000001000000030000000100000008000000030000001e0d0000010000000d07000008000000eb0500003100000003000000010000000900000054000000ffffffffe1ffffff0002000064000000010000000000000007000000ff0f000006000000a0b500000566d0a803000000950c0000fcffffff0000fe0100000000e0d2000008000000080000000700000009000000d208000007000000000000000300000000000000ffffff7f0700000000f0ffff08000000ae9c000006000000060000000900000085020000c800000007000000ff7f0000090000000400000001000000ff000000ff00000007000000070000008100000001000000ff7f00000300000002000000fcffffff00000000060000000300000001000080ff0000000008000007000000ff070000010001003b2fffff0800000006000000fcffffff01800000050000000080020000040000ff7f00001300000003000000000000000400000008000000060000000600000086280000e3fbffff8350000009000000030000000200000000000000020000000200000004000000030000000c00080009000000000000003c00010006000000060000000800000007000000ffffffff40003f00050007002336ffff050200000400060003000000180000005718000005000000e0000600bbb7b7b16b4d263a938dbf6abaa1290aa3535411bd09aa26726585b25023668f5540cf8552ca65d5db592c6610783ccd81cbdbd61e6c5236d7e72e1940ab62230c293f938dfcc47cc83ece8298aca472d4a7df34dd64176c9a50f0028a9ac3ce2ef53c2253ef382c121eed56a301220f82a9b48f1cefba7dbea29ccf0bf08eb93fe7aeb351f54490e73701143687db4c95844fec6b754b65532bad44606778fdf9806d4a8971818e53c567175011deda03abb930ffb40ace603e35d2ece5bfea5cbe98a36bbdbbc948a47129593825bc41fc608b49ee440bfd829dc80c00070000000000010000000c000800030000000100000014000300fc0000000000000000000000000000010a000100726f75746500000028180200080003009200000008000200b70000000800030007000000a00c05003c000100ff7f0000050000000010000000000000000100000601a8000080ff7f0700000009020200ff070400410000008904000006000000070000000c00080009000000000000000c00090002000000000000000404030003000000722a00000180ffff010000000800000005000000ff01000002000000ff7f0000090000000500000000000100ffffffff09000000000000000004000006000000060000003f000000070000007b04000003000000010100000000000002000000ffff000006000000070000000500000000000000080000000700000008000000080000000329000040000000f7ffffff0600000006000000070000000104000003000000000000002400000000800000ff03000008000000780800000700000086410000070000000000000005000000030000000200000050010000963300000000000006000000ff0700000300000091000000400000000800000008000000270000001f000000080000000600000006000000788b000008000000ff0300000080000008000000060000000400000001040000030000000900000000010000050000000900000057010000200000000300000002000000090000000000000000100000001000008100000000000100050000007f000000080000000800000005000000ad010000a863f15d3f00000020000000060000000900000000000000feffffff01000000008000003f000000ff0100000200000006000000030000000800000004000000090000000300000007000000ff0300000900000000000100ff000000590400000200000004000000285a00009000000005000000ff07000080000000030000000600000005000000090000000600000000000000ff010000070000000800000002000000fbffffffc0ffffff0400000081ffffff0200000085b60000070000003f00000007000000cb010000ff0f00000180000001040000070000007f000000060000000500000002000000ffffff7f001000000000000006000000ff01000004000000060000000700000008000000040000004b0d0000a0470000ff01000000000000060000008000000000feffff08000000f9ffffff08000000ff030000d0110000fffffffffaffffff00020000020000000800000063fcffff04000000080000000000000007000000000000003e22f36a010100003f0000000200000000000000aa000000a4ca00000100008009000000090000000104000000020000060000000104000001000100cf796d7d02000000040000007f0b0000970000000000000000000000050000000a3644057f1b00001f000000ff7f0000a8000000000100000000000002000000060000004167f61f0300000002000000ffff00000200000006000000b0b4ffff0400000000010000050000000100000008000000ffffff7f030000000300000009000000000000000000200106000000ff000000cd6700000400000000040000030000000500000048060000040000008e1effff0080000082000000008000006728ffff00fcffff0404030001000000000000000700000001000000010000000300000000000000faffffff08000000040000000900000004000000030000001e000000090000008f950000fcffffff79000000090000000400000003000000010000000300000001000100c200000003000000feffffff060000000500000008000000000400000700000006000000010000000400000000008000a01cd6121f00000000000000080000000a0000000500000077e000007f00000006000000030000000200000001000100110f000006000000070000000300000008000000080000000180000088c100000010000005000000f9ffffffbe0000000600000008000000e646717e00000000db01000008000000ff000000090000000300000001800000010000002d05000001000000000000000400000000020000480000000300000000000000ff03000000040000ffffff7f0002000000000100040000000900000005000000690e000003000000020000001f0000007f0000000700000004000000ff01000001000080000001000000000006000000060000004fcb00000200000080000000400000000100000006000000feffffff0600000000000000ffff0000010100003600000001010000ff7f00007d7f00000300000001040000000000007f00000009000000feffffff509800000000010036000000030000000200000009000000f9ffffff0008000002000000ffffffff00040000ffffffff08000000c3757d0d00000000050000006907000000040000ff0f00004a070000c722000001000000e60000000000c000a5ffffff0200000008000000c5ae46c4050000000c00000009000000da8700000600000000000000371b000000000000050000007f00000000040000b00d00000400000003000000040000005d0c000003000000010000005b0000007f000000018000000600000095d00000000400003a0000000700000003000000840d00000000000002000000690000000000000002000000a3dd0000000000000200000004000000bd63000006000000018000000600000007000000000400000000000000010000a2744463000000000000000003000000810000000000000001000000010000000600000002000000030000000100000001000000050000000900000002000000fc0f0000ffffffff70070000120000004000000002000000feffffff02000000ff0100000002000095f17e01ff000000ed79000001000000180000004d0000000700000002000000000000007f0000008485000004000000060000000000010001010000000001000200000007000000090000008d0300000000ea130700000005000000060000000104000005000000000000007a860000010000000000008008000000e0000000c00000000100000006000000010000003c0001004eab0000030000000400000001000080070000000000080007000080018000007f000700020008000100000000000000050000000100000004040300de00000001040000ff7f00005ff50000f7ffffff080000000900000020000000ffffffff00000000000000003c000000020000000104000000010000ff7f0000030000000000f0010400000006000000b2020000ff7f0000ff01000001000000020000000900000007000000010400002e0b0000050000007b0000008f0f000006000000a6c8000003000000060000006b000000f30000000000000001000000070000004000000006000000050000000900000001000000020000008100000003000000070000000101000000000000050000000000010000000000050000000000008056ed277f486199368000000062a9000040000000080000002000000009000000080000000500000006000000060000008520000003000000ffff0000040000000700000001000000a0000000000800000900000004000000010000000900000007000000070000000300000001000000060000000500000001000000faffffffffffffff0180000000fcffff08000000000200000800000000040000030000000100008001f0ffff070000000900000009000000020000000100000000000000000000000100000006000000fcffffffffffff7f0500000005000000f0ff0700ffffff7fffffffffffff0000080000000700000009000000efa7000077fd000005000000ff07000004000000fdffffff00000000ff030000f7ffffff7f00000040000000000000000500000009000000000800000800000001000000070000000600000005000000030000000500000000000000000001002a0f0000070000000500000040000000010000002000000040000000800000005800000001040000010001004c0000000008000007000000ffffffff030000008100000001000080000000000700000008000000a20600000000000000100000ff0300000100000004000000000000000600000080ffffff08000000ff0f0000004731000900000003000000000200000000000000000080810000000100000000800000040000000500000006000000020000000100000040000000000800000000000006000000050000000200000008000000040000002000000063030000030000000000000098de0000090000000000000080ffffff0600000005000000f00200000600000004000000f303000000040000ffff0000070000000400000008000000810000000400000000010000b200000081000000000e00000000000002000000050000008e00000000010000010000000000008002000000030000000700000002000000e0ffffffad650000fffffeff0100000003000000020000003f000000b70300000700000000000000000000800400000008000000050000009900000000000000ff030000040000000e0000000900000007000000ffffffff20000000780506008000100009000100766c616e00000000540002801c00020009000000000000800100000096ec00003c0b0000010000000600030030030000050006000400000005000600010000001c00020002000000040000000500000094010000f100000002000000040006000c00070000000000010000000c0008000200000002000000f800100007000100637400009400028006000e004e2400001800010080000000000100000400000007000000b008000018000100a50c00000700000004000000040000000000000014000800466e80c3c43ed7534a2eb4181f2991ac06000d004e2300001800010001000000f7ffffff000000200300000008000000060003001400000006000e004e21000014000b00fe8000000000000000000000000000bb4000060021b93a8279d8a02dc0622759a894dc538b5158801882d6fcedfc1dca23029b24ddbb4ce0ff8e0d6ca95a196fdc46e3c7009045156a1f8db0de3bc8df0c00070000000000000000000c00080003000000050000002c011f000f00010074756e6e656c5f6b657900005c000280060009004e240000080004007f00000108000400ac1414bb1c000200ffff0000e707000006000000000000000200000002000000060009004e210000080003007f00000114000600fe8000000000000000000000000000bba40006001f626fdb5d4074eab4cb34d9ce7d9326f29c3ed46fe23b9e7207527ebe427af4379770d26e34d65f1459679ae14e4c04c8e393551d17f4c64c17a142266c0dd50c816dbc92e9505fd74d87fe80edbc029e70cc69316b1050ad9b0028f09dd02738ab90f63e6d57f1fb6bead330d4fcd209ac53bce94c83803e6dad351a627fc29cca4ceb537dcc34f34703b0b8ead56e3834ec924abbe5e31af7657d22cc70610c00070001000000000000000c0008000100000001000000c40004000800010069666500100002800a00030000000000000000008d000600cc69496a66c4762e01698e9c3962fb3ecd0d2c019bfcd656e6dede169c7f5468543e2c0455709a9e1295c7e01d7bbb096a3e2679002c502638f02d951e1ce7cad5e1e8a0380bbe97342112f2bd350797de6b0ca003093998e1ab8d51bf7935702224d974e080bb5936a8d99e32a2ba9fed10ca9b9e03285daff9201a4ceeb78a3a876d2a589be684cf0000000c00070000000000000000000c0008000200000002000000b80010000800010069666500540002800a000300bbbbbbbbbbbb00001c0001000000000009f900000000000006000000ff070000000000000a000400aaaaaaaaaa1d00001c0001007f00000000000000040000000001000082020000000000003f000600151b006b5a1cf8a04413fdf34bc4039692a69cf2eab88ec8133f8c5dd92d98f6b26b73e349009ad59ceeb40a979ac620bab3755d7feb430207d288000c00070001000000000000000c000800070000000300000054011d000c000100736b6265646974003c000280080003000f00f3ff18000200030000000080ffffffffffff03000000e000000008000500cf00000008000300e0fff2ff0600070006000000ef00060010a4d94a8912d1ce7eef58e6d74a69ba77f2c2db14d8838c5f08fa4b9ceb5ec961788f02acb8bbf30ce62d19ef4a926440655fd15487168a5feaa358dc2c94f0dfbca232010991465e76585b1a17d1fae135d1d2e90fe9f038ba1bf8c858c72298ffbb299a744dd79cd337972c8218c39b611c91095c3c5d02e0815b3bdca28797ea977db439ee6fe4355c4d07b2739907315a5ba0995aff2fcb0937f091160601b21527c43fead16028bf37b09a5235313e8108374fe78e9ce453858b7f6535ca369ba432d9b3b60f2d6436c9150760175e5dd8cf8f055abb9c263da00513ffc29c2e0225c35e92225f98000c00070000000000f6e352140c0008000100000000000000d4050600cc00180009000100766c616e00000000700002801c000200050000000600000005000000000000000400000003000000060003005b01000006000400810000001c0002000400000000000000000000100000010005000000020000001c000200ffff00000100000006000000060000001c0400000300000006000300760a0000330006009ad8f64d8b52e8c7420b9595c9beaefdb41d890b0d4085a7fc16744247341855ecf1f766b63b2b90a4b7dce9e611fb000c00070001000000010000000c000800010000000200000014010d000700010078740000540002802400010066696c74657200000000000000000000000000000000000000000000000000002400010066696c746572000000000000000000000000000000000000000000000000000008000300090000009c00060047edde37d1086c6bdcf454ab03834d05341e254fa822ea4db31c3276742aa60add7448c62886addc2188651072897b48c59b341daac93cb1bd2e58ddbce84ff1b21256887d4b08691329f37a6d035921cd82930514c6f41fb4037f52d12545f9cf1d892397b0389e4919b305d0409e65b2b14d78c672a35fe72de260279071c383e766df07a17a55b45d68846371134c58ac016dc105377b0c00070001000000000000000c0008000300000002000000400215000700010078740000740102800800030003000000a9000600e70e6d616e676c65000000000000000000000000000000000000000000000000000003000500361d3566cbcd304fd9f5458e51349c77505c444ac0b3c87b1401c5d9afa64bb606600dc626791a924b08974dc7d04d27756b817c6f12b52a4340159db33ed4599e0b4aaf5654a0050ca23061330a7bbad3ea53de7adef220c0d86fe21f770452bb47d7c437a962eb36dbf4e52b7c3750df1cb476ff0a49c3e3916d593ae84f000000b3000600090066696c746572000000000000000000000000000000000000000000000000000002000200f5107a6a72f6f42d31e040c1db9e15a236b4f048f42273cac8a31d83acefde535a320092d71d21045b02e67798b05b623a8c6bc93ad5a04369a6fa78ec5c0bd0dbe552465776ddc55cb73256eb8d140f52d159eb484d3086d654054441deca04ab85689a8ae4d77d3338c11d5da95e9ab93c5e8d0950cc712448817b56e8e5ec5860f76f840d38c007000800020000000000a7000600fd68d07e0bf8a789c00c313cfd05096f2557f29986f35a9c4c99c18b0a083a9d3b0d2a3da3a7773a328c20a216e565292d630628fe4a679cd842bf29dede3971b7d0fdaed65b27b2b3b88c55656f84e1280450cce073ca6a68933181beed899b4bcd82af77e4fdbf41adba7f1fae4dcb097a3d206f05fa3ab23ed2482fde431ee3f3974958e91d0b4adde4c36225cdec9626b088c0b5d2730e357fe4a94366fe2a2070000c00070001000000010000000c0008000300000003000000b0011e0008000100697074001c010280a9000600070066696c74657200000000000000000000000000000000000000000000000000000000060097953e214c47267df5c3f2f9523b8800966c096f77c6c42eb026df2b825c5e73fc10d55113d5c3274e67504df8649448e13f5b74f0718eced76477452600aa112d3e754bb4fa38662ca0ffa973c0dcdd0500bd6f7b0b2bf37b61ff7d785a8fb15c8c0b3a3edfa313205d1cb4b43768edd92dd31fa06e07d1a9f85177414cf50000002400010073656375726974790000000000000000000000000000000000000000000000003d000600060072617700000000000000000000000000000000000000000000000000000000009f000100f6f7f45a58d8b59131f209084e263e5bf7ea0400000008000300008000006e0006004872197e43c83ab1bf38136fcdeb1280b956f25244a18e5a1db01f1d83af3cc4bfaa2d852b9bac3830c9a17a374b956542555023e4e37587e7f0b2adf590563f347fc9ff69f6632d3650017f2a5678e143eb60d013c18fb0cc776daf4f0522176d52ddc37f4d3c227c6000000c00070001000000000000000c000800000000000100000008000400", @ANYRES32=r17, @ANYBLOB="080002008f00000008000100ffff0e0008000300dc00000006000500003f0000080091a03d2f400b00a50000000b000100666c6f77657200002c0002000500450000000000050049000600000005003d0004003d0006005c000600000008000d00ffffff00"], 0x3920}, 0x1, 0x0, 0x0, 0x20008080}, 0x4040081) 05:05:56 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf) 05:05:56 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000) 05:05:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="64000000200001"], 0x64}}, 0x0) 05:05:56 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4) 05:05:56 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x10) 05:05:56 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e80), 0x200, 0x0) [ 656.561274] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 656.573774] Restarting kernel threads ... done. [ 656.643446] IPVS: ftp: loaded support on port[0] = 21 05:05:56 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000580)=@bloom_filter={0x1e, 0x81fa, 0x6, 0x9, 0x506, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000001580)=ANY=[@ANYBLOB="18080000000000000a37330000ff010000000000df029e0f1894b87955f4e13caf044d27d785a0271edd15cceda3ff35351051c59dcbea3dad9fa6822dbd21aa270c4e71c76ec0356360a42bb0408dcd287d44348ff035fe3e9024b01234b79cf7166f156ff0eb2411c6bfbc025591887d12cdbff6c57bb773061b526d15b4bcb8b78faba81f16981c010000e7bd30ed82298f16e89fcb9629f966e69a083e30211461a4a33d610bb325435989d10dfdd216eea42d436963666f6d774ede363be8b7e8889ecbec6f1b52542798b40a639713464f446091215942fe040074495f68489899f20b280fe1de9412803e5dee03ef0dee1ee5bc2fbe8a528c482aa08a54bde5f5cb0bb41f0026b04d40ec69ef65aeed2dad95dff272b9ab5d52a8b3655b0aef5de2897a9d92633975080744c348d92191ed4c82b96a1c133a000000000000a49442fc2f97293fed04721761dff42b09bdeb862ede54974ce6", @ANYRES8=r0, @ANYBLOB="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"], &(0x7f0000000680)='syzkaller\x00', 0x9, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x22020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='rpc_pipefs\x00', 0x4, 0x0) unshare(0x40020000) rmdir(&(0x7f0000000740)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x4000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x6589}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000300)=0xc) unshare(0x200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xe3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000006c0)=[@text32={0x20, &(0x7f0000000600)="b9e50200000f32c4c27d1c69e70f01d113649e3e9e3ec478970f0000000500000500c00f3235004000000f30660f38807a8eb88000c0fe9d350000c0000f23f80fc75c1af3393d000000000fc77180", 0x4f}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x39}, 0xffffffff, 0xffffff00, 0x2, 0x5, {@empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}}, 0x6, 0x8, 0x2, 0x8000, 0x101, 0x200, 'ipvlan0\x00', 'pimreg0\x00', {}, {0xff}, 0x0, 0xc}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @local, 0x1}}}, {{@arp={@remote, @empty, 0xffffff00, 0x0, 0x5, 0x9, {@empty, {[0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, 0x1f, 0x2736, 0x8, 0x9, 0xfff7, 0x3, 'wg2\x00', 'hsr0\x00', {}, {0xff}, 0x0, 0x8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x12}, 0x2, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000e40)={0x0, 0x0, @ioapic}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{}, {0x77359400}}, &(0x7f0000000280)) 05:05:56 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000) 05:05:56 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6) 05:05:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001840)=@bloom_filter={0x1e, 0x433}, 0x48) 05:05:56 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x60) 05:05:56 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x4, 0x3}}]}, 0x30}}, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4800}, 0x0) (async) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) (async) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0x0, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={r6, r7+60000000}) (async) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, 0xffffffffffffffff, 0x8000, '\x00', r9, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b40)={r8, 0xffffffff}, 0xc) (async) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r12, 0x58, &(0x7f0000000440)}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r13, 0x58, &(0x7f0000000440)}, 0x10) (async) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001bc0)={&(0x7f0000001b80)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x2, &(0x7f0000001980)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r10}], &(0x7f00000019c0)='syzkaller\x00', 0x1ff, 0x9d, &(0x7f0000001a00)=""/157, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001ac0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001b00)={0x0, 0xc, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c00)=[0xffffffffffffffff, 0xffffffffffffffff, r11, r12, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff]}, 0x80) (async) r15 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r16 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r16, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001900)=@bloom_filter={0x1e, 0x401, 0x8de, 0xff, 0x1008, r15, 0x8000, '\x00', r17, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0xf}, 0x48) (async) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000003dc0)=ANY=[@ANYBLOB="203900002d0000012cbd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r17, @ANYBLOB="080002008f00000008000100ffff0e0008000300dc00000006000500003f0000080091a03d2f400b00a50000000b000100666c6f77657200002c0002000500450000000000050049000600000005003d0004003d0006005c000600000008000d00ffffff00"], 0x3920}, 0x1, 0x0, 0x0, 0x20008080}, 0x4040081) 05:05:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000100)=@ipv6_getnetconf={0x14, 0x52, 0x1}, 0x14}}, 0x0) 05:05:56 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0) [ 657.010926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 05:05:56 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8) 05:05:56 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0x209, 0x3f}, 0x1c) 05:05:56 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8000000) 05:05:57 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa) [ 657.192138] Restarting kernel threads ... done. [ 657.480628] IPVS: ftp: loaded support on port[0] = 21 05:05:57 executing program 5: r0 = socket(0x1, 0x3, 0x0) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 05:05:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:05:57 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc) 05:05:57 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa000000) 05:05:57 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000580)=@bloom_filter={0x1e, 0x81fa, 0x6, 0x9, 0x506, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000001580)=ANY=[@ANYBLOB="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", @ANYRES8=r0, @ANYBLOB="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"], &(0x7f0000000680)='syzkaller\x00', 0x9, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) unshare(0x22020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='rpc_pipefs\x00', 0x4, 0x0) unshare(0x40020000) rmdir(&(0x7f0000000740)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x4000, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x6589}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000300)=0xc) unshare(0x200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xe3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000006c0)=[@text32={0x20, &(0x7f0000000600)="b9e50200000f32c4c27d1c69e70f01d113649e3e9e3ec478970f0000000500000500c00f3235004000000f30660f38807a8eb88000c0fe9d350000c0000f23f80fc75c1af3393d000000000fc77180", 0x4f}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0xe8, 0x1f8, 0x308, 0x308, 0x308, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x39}, 0xffffffff, 0xffffff00, 0x2, 0x5, {@empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}}, 0x6, 0x8, 0x2, 0x8000, 0x101, 0x200, 'ipvlan0\x00', 'pimreg0\x00', {}, {0xff}, 0x0, 0xc}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @local, 0x1}}}, {{@arp={@remote, @empty, 0xffffff00, 0x0, 0x5, 0x9, {@empty, {[0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0x0, 0xff]}}, 0x1f, 0x2736, 0x8, 0x9, 0xfff7, 0x3, 'wg2\x00', 'hsr0\x00', {}, {0xff}, 0x0, 0x8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @broadcast, @dev={0xac, 0x14, 0x14, 0x12}, 0x2, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000e40)={0x0, 0x0, @ioapic}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{}, {0x77359400}}, &(0x7f0000000280)) 05:05:57 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x300) 05:05:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) socketpair(0x0, 0x80000, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), 0xffffffffffffffff) socketpair(0x23, 0x0, 0xffff, &(0x7f0000000340)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001300), 0x60000, 0x0) 05:05:57 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) 05:05:57 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "9012d34d2ceb7a8a06f277715f704a7cc45e77991e5f7b171877e3132eb3e2dc37f6e4b4159f07c608e84e54118ab108f2ba20cea4e1db97a48774a55cb0ba2d"}, 0x48, 0xffffffffffffffff) keyctl$describe(0x6, r0, &(0x7f0000000880)=""/4096, 0x1000) 05:05:57 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x337) 05:05:57 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe) 05:05:57 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc000000) 05:05:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'vxcan1\x00', 0x0}) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xa01}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x100, 0x70bd25, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_LINK={0x8, 0x1, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:05:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='x']}) 05:05:58 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x55c) 05:05:58 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf) 05:05:58 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe000000) [ 658.383799] IPVS: ftp: loaded support on port[0] = 21 05:05:58 executing program 3: socketpair(0x25, 0x3, 0x0, &(0x7f0000001100)) 05:05:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:05:58 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x600) 05:05:58 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x10) 05:05:58 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000000) 05:05:58 executing program 4: syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000e40), 0xffffffffffffffff) 05:05:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c0000001a000106"], 0x1c}}, 0x0) 05:05:58 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8982, &(0x7f0000000000)) 05:05:58 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x700) 05:05:58 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x10000000) 05:05:58 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x60) 05:05:58 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x20008000) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:05:58 executing program 3: syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) 05:05:58 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x37030000) 05:05:58 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa00) 05:05:58 executing program 3: syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000940)) 05:05:58 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0) 05:05:58 executing program 4: timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) timer_delete(0x0) 05:05:58 executing program 5: r0 = socket(0xa, 0x3, 0x43) bind$vsock_stream(r0, 0x0, 0x17) 05:05:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x7, 0x0, 0x0, 0x8}, 0x48) 05:05:58 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x60000000) 05:05:58 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc00) 05:05:58 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x300) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x337) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe00) 05:05:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f000000d880)='net/udplite\x00') read$FUSE(r0, 0x0, 0x0) 05:05:59 executing program 5: r0 = socket(0x2, 0x3, 0x8a) syz_open_procfs(0x0, &(0x7f000000d880)='net/ip_tables_matches\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x541b, &(0x7f0000000000)) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf00) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x600) 05:05:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000003c0)=0xfffffff9, 0x4) 05:05:59 executing program 3: syz_clone(0xa1222400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) sched_rr_get_interval(0x0, 0x0) 05:05:59 executing program 5: syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x65580000) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x63f) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3703) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa00) 05:05:59 executing program 3: r0 = socket(0xa, 0x3, 0x87) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x541b, &(0x7f0000000000)) 05:05:59 executing program 5: r0 = socket(0xa, 0x3, 0x43) getsockname$packet(r0, 0x0, &(0x7f0000000500)) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x81000000) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x5865) 05:05:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8904, &(0x7f0000000000)) 05:05:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 05:05:59 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x5c05) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc00) 05:05:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000a80)={'ip6tnl0\x00', &(0x7f0000000a00)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @local}}}) 05:05:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x7}, 0x0) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff) 05:05:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f000000d880)='net/udplite\x00') read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe00) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000) 05:05:59 executing program 5: socket$netlink(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 05:05:59 executing program 4: syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001240), 0xffffffffffffffff) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xdd050000) 05:05:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x1000, 0x0, 0x3}, 0x48) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6558) 05:05:59 executing program 5: r0 = socket(0x28, 0x5, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x100000000, 0x8) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf00) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff) 05:05:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, 0x90) 05:05:59 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8100) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3703) 05:05:59 executing program 5: getsockopt$MRT(0xffffffffffffffff, 0x0, 0xce, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote, @broadcast}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000200)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0x49, 0x0, "2d01210fa52cb20e0b0a8e1f6c768d835c0fefcb2fa53a539feea8194443db3625a41df44acf4c623996cf457e5aca8eb2844946e8ae67fc85fd42f7ec7232bd5adb9e878fc63a2c10a9fbf3df4bc508"}, 0xd8) pipe(&(0x7f0000000640)) bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0xa, 0x80, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 05:05:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000dc0)={&(0x7f0000000c80), 0xc, &(0x7f0000000d80)={0x0}}, 0x1004d8d1) 05:05:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0xa, 0x0, 0x0, 0x6}, 0x48) 05:05:59 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff0000) 05:05:59 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000) 05:05:59 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3f06) 05:05:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x0) 05:05:59 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) pipe(&(0x7f0000000580)) 05:06:00 executing program 5: pipe(&(0x7f0000000580)) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x5865) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f0000) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff) 05:06:00 executing program 5: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 05:06:00 executing program 4: pipe(&(0x7f00000015c0)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x80800) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffa888) 05:06:00 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000001340), 0xffffffffffffffff) 05:06:00 executing program 5: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) pipe(0x0) 05:06:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 05:06:00 executing program 3: socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'ip6tnl0\x00', 0x0}) setsockopt$MRT6_DEL_MIF(0xffffffffffffffff, 0x29, 0xcb, 0x0, 0x0) pipe(0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @rand_addr, @multicast2}, &(0x7f0000000700)=0xc) bind$xdp(0xffffffffffffffff, &(0x7f0000000a00), 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0xa, 0x80, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffff000) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6558) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffe) 05:06:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0xa, 0x80, 0x4, 0x6}, 0x48) 05:06:00 executing program 4: socket(0x0, 0x0, 0x0) pipe(0x0) pipe(&(0x7f0000000bc0)) 05:06:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000dc0)={0x0, 0x0, 0x0}, 0x0) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8100) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x34000) 05:06:00 executing program 5: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000008c0), 0xffffffffffffffff) syz_genetlink_get_family_id$net_dm(&(0x7f00000009c0), 0xffffffffffffffff) 05:06:00 executing program 5: pipe(0x0) pipe(&(0x7f0000000640)) 05:06:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000840)={0x0, @in6={{0xa, 0x0, 0x0, @remote, 0xffff}}}, 0x90) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff9e) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40000) 05:06:00 executing program 3: setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) 05:06:00 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x8642, 0x140) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400300) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffff0) 05:06:00 executing program 5: setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) 05:06:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 05:06:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000002040)='net\x00') openat$cgroup(r0, &(0x7f0000002080)='syz0\x00', 0x200002, 0x0) 05:06:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000002040)='net\x00') 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffff) 05:06:00 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) setsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f) 05:06:00 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000000c0)=""/176) 05:06:00 executing program 4: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x0) 05:06:00 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000000000) 05:06:00 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280), 0x0, 0x0, 0x0) 05:06:00 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000) 05:06:00 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffe) 05:06:00 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x488840, 0x0) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x34000) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x2000000) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40030000000000) 05:06:01 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) 05:06:01 executing program 5: clock_gettime(0x0, &(0x7f0000001200)) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3000000) 05:06:01 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, 0x0) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40000) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffffffffff) 05:06:01 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fchdir(r0) 05:06:01 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, 0x0) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000) 05:06:01 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400300) 05:06:01 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x100000000000000) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000) 05:06:01 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x2c0, 0x0) 05:06:01 executing program 4: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 05:06:01 executing program 5: openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='io.pressure\x00', 0x2, 0x0) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffff) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x200000000000000) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x7000000) 05:06:01 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) write(r0, 0x0, 0x0) 05:06:01 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8000000) 05:06:01 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x300000000000000) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000) 05:06:01 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, 0x0) 05:06:01 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa000000) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x2000000) 05:06:01 executing program 5: syz_clone(0x0, &(0x7f0000000040)='>', 0x1, 0x0, 0x0, &(0x7f0000000140)) 05:06:01 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400000000000000) 05:06:01 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x20800, 0x0) 05:06:01 executing program 5: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3000000) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x600000000000000) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc000000) 05:06:01 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) 05:06:01 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, 0x0) 05:06:01 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) pipe(&(0x7f00000002c0)) 05:06:01 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x800000000000000) 05:06:01 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000) 05:06:01 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe000000) 05:06:01 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) 05:06:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001300)={0x0}}, 0x0) 05:06:01 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000940)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001300)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002380), 0xffffffffffffffff) 05:06:01 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000001600)) 05:06:02 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000000) 05:06:02 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa00000000000000) 05:06:02 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000) 05:06:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter, 0x48) 05:06:02 executing program 4: sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, 0x0, 0x0) 05:06:02 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x4}, 0x10}, 0x80) 05:06:02 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc00000000000000) 05:06:02 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x10000000) 05:06:02 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8000000) 05:06:02 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff}) socket(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, 0x0, 0x0) 05:06:02 executing program 5: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8a831, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x9b2, 0x4) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000500)=""/200, 0xc8}], 0x1) 05:06:02 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa000000) 05:06:02 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe00000000000000) 05:06:02 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x37030000) 05:06:02 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8}, 0x8, 0x10, 0x0}, 0x80) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000b80), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001300)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002380), 0xffffffffffffffff) [ 662.511535] IPVS: ftp: loaded support on port[0] = 21 05:06:02 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc000000) 05:06:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 05:06:02 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x5c050000) 05:06:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x14}, 0x14}}, 0x0) 05:06:02 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe000000) 05:06:02 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf00000000000000) 05:06:02 executing program 3: msgget$private(0x0, 0x460) 05:06:03 executing program 5: semctl$SEM_INFO(0x0, 0x3, 0x13, &(0x7f0000000000)=""/148) 05:06:03 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf000000) 05:06:03 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x60000000) 05:06:03 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000000000000) 05:06:03 executing program 3: semget(0x3, 0x0, 0x302) 05:06:03 executing program 4: msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f00000000c0)=""/139) 05:06:03 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/4092, 0xffc}, {&(0x7f00000019c0)=""/4085, 0xff5}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0x72, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x841, 0x0, 0xffffffffffffff27) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000011", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='.', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 05:06:03 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x0, 0x4, 0x6}, 0x10}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) 05:06:03 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3703000000000000) 05:06:03 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x65580000) [ 663.476467] netlink: 44218 bytes leftover after parsing attributes in process `syz-executor.3'. 05:06:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000007380), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpgrp(r1) 05:06:03 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0xfffc, 0x800}], 0x1, 0x0) 05:06:03 executing program 4: semget$private(0x0, 0x1, 0x310) 05:06:03 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x10000000) 05:06:03 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000000)=""/25) 05:06:03 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x81000000) 05:06:03 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000000000000) 05:06:03 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000080)=""/50) 05:06:03 executing program 3: semget(0x2, 0x0, 0x220) 05:06:03 executing program 5: r0 = semget(0x2, 0x0, 0x0) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000000)=""/138) 05:06:03 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000007380), 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 05:06:03 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6558000000000000) 05:06:03 executing program 3: semget(0x1, 0x0, 0x6e82b956fd808235) 05:06:03 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x37030000) 05:06:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x60002, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 05:06:03 executing program 5: semget$private(0x0, 0x2, 0x108) 05:06:03 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff) 05:06:03 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3f060000) 05:06:03 executing program 3: semget$private(0x0, 0x3, 0x246) 05:06:03 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8100000000000000) 05:06:03 executing program 5: semget$private(0x0, 0x4, 0x190) 05:06:04 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0xc) 05:06:04 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0xc0c3af6ddf63c80e) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff00000000) 05:06:04 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) fstat(r0, &(0x7f00000001c0)) 05:06:04 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) write$FUSE_WRITE(r0, 0x0, 0xffffffffffffff45) 05:06:04 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0xfffffffffffffef3) 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x60000000) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff00000000) 05:06:04 executing program 3: semget(0x2, 0x0, 0x207) 05:06:04 executing program 5: semget$private(0x0, 0x2, 0x384) 05:06:04 executing program 5: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETPID(r0, 0x0, 0xb, 0x0) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xdd05000000000000) 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff) 05:06:04 executing program 3: memfd_create(&(0x7f0000000040)='/dev/null\x00', 0x3) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x65580000) 05:06:04 executing program 5: syz_clone(0x5810d000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 664.612633] IPVS: ftp: loaded support on port[0] = 21 05:06:04 executing program 4: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 05:06:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff00000000) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x81000000) 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff0000) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff000000000000) 05:06:04 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff) 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f0000) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f000000000000) 05:06:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x101141, 0x0) 05:06:04 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000240)=""/4096) 05:06:04 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x10) 05:06:04 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xf, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x83}]}, &(0x7f0000000240)='syzkaller\x00', 0x5, 0xac, &(0x7f0000000000)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff) 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffa888) 05:06:04 executing program 3: semget$private(0x0, 0x2, 0x10) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f00000000) 05:06:04 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x60002, 0x0) write$FUSE_LK(r0, 0x0, 0x42) 05:06:04 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff) [ 665.076308] audit: type=1804 audit(1673586364.878:328): pid=11431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir3515323468/syzkaller.LSNij8/1054/file0" dev="sda1" ino=17221 res=1 05:06:04 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffff000) 05:06:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$char_usb(r0, 0x0, 0xfffffffffffffe59) 05:06:04 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffffffffff000) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff0000) 05:06:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000007380), 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0x0) 05:06:05 executing program 4: timer_create(0x4, &(0x7f0000000100)={0x0, 0x35, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) 05:06:05 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x40301, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 05:06:05 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0xffffffffffffff4c, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x3c}}, 0x0) 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f0000) 05:06:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000007000000000000000600000018260000", @ANYRES32, @ANYBLOB="0000000008000000184900000700000000000000a6b70000950000acac1bb4ad00002c868be885f1d5ba38cb0feb94f64836000000d97e5547092609b2d3ec2199393f9bb1f5e20264ac394e900f681401ba9469aeed3e16ec821f68739245d1472233a94cda08c081517e1bdcc1488ebf93489489535417f159dc07707eb2e6dad4c69e9bdf42011d86c6169f4fec2d0dead5e4338618eccc96c6a6936e9f8aa69664d996b66ef82bcfcaf0bfe2be24a3e0426e9987761c3f8d0c4a9e4ea6cf"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000140), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff]}, 0xdb) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffa888) [ 665.349268] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 05:06:05 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x13}, 0x14) 05:06:05 executing program 3: perf_event_open$cgroup(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff9e) 05:06:05 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0xffffffffffffff4c, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x3c}}, 0x0) ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') (async) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r1, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) fallocate(r2, 0x3a, 0x0, 0x53c132ef) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0xffffffffffffff4c, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x3c}}, 0x0) (async) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffff000) [ 665.524418] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 05:06:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xf, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0xff2f}]}, &(0x7f0000000240)='syzkaller\x00', 0x5, 0xac, &(0x7f0000000000)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:06:05 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 05:06:05 executing program 5: syz_clone(0xc0008000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="90d9976986b1488c6085033c72daa408008851bc27606c9ef9b6816aedfc43a5dc43850fd25f4b5752cc6b56477f7aea8663e6622a4c4868fca65c08d9f877b7a3335f3afdff7296a90773eeb146469ec0959c86bdf892bee2d6d12cef65256197bd4186bfc127961884a4a293e420beb7fcdbf5e20b22f4786abe627f93e30258474090e0190d8911ce49253d018f86c41a4af3215b1fddf976247259fbb057e7f39f6b696ca3499c297105c57bc14c155aecdb37abb1cfa98f8996af8795da8f25dfd7a122c1e68cb628d27ac8fe9f61681d2c8bfceac2b0e8bdd394aad43c5f5c69") 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffff0) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f) 05:06:05 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0xffffffffffffff4c, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x3c}}, 0x0) ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') (async) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r1, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) fallocate(r2, 0x3a, 0x0, 0x53c132ef) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0xffffffffffffff4c, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x3c}}, 0x0) (async) 05:06:05 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000016c0)={&(0x7f0000001800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000000000) [ 665.674338] IPVS: ftp: loaded support on port[0] = 21 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff9e) 05:06:05 executing program 3: syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) syz_clone(0x71f295c27eb04014, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)="0fa55ac08569c8ba9ecaa6e316ec7719fd636e63c1b289781d5302576cca00dd175447545bd668ff24c94219c1c8b31d1a8e85a2d8bb2c3c504a0156c218247bd20633080b32da5802f4ef1d3cc998e2ccc662affb9437810660346d0177c83458d53633a49c3aa7f64bb8deade98c90ee4fe4cc2aa020ea8b0c01700989460a3b16749831") [ 665.696176] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 05:06:05 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531c89da21880d4dd1a5db06c0936665c80dfdf935cf3e21e8b26e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x0) 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40030000000000) [ 665.847354] IPVS: ftp: loaded support on port[0] = 21 05:06:05 executing program 4: syz_clone(0x5ca28180, 0x0, 0xfe26, 0x0, 0x0, 0x0) 05:06:05 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffff0) 05:06:05 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r1, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) (async) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x0) 05:06:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x8, 0x3, &(0x7f0000000600)=@framed, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:06:05 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffffffffff) 05:06:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x100000000000000) 05:06:06 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x0) ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') (async) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r1, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) fallocate(r2, 0x3a, 0x0, 0x53c132ef) (async) socket(0x1, 0x803, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x0) (async) 05:06:06 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x4000000000000) 05:06:06 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x0) 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x200000000000000) 05:06:06 executing program 3: syz_clone(0xbb8ee4c0, 0x0, 0x52, 0x0, 0x0, 0x0) 05:06:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffff24e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:06:06 executing program 3: syz_clone(0xa0100400, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:06 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x40030000000000) 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x300000000000000) 05:06:06 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0xbc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:06:06 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB="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"/387]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfff3}}}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000840)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) 05:06:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x950, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x7fff}, 0x491, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000030000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x1, 0x7f, 0x6, 0x1, 0x0, 0x9, 0x40000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xe}, 0x4, 0x0, 0x665, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r0, 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) 05:06:06 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x950, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x383, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000030000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x7f, 0x6, 0x1, 0x0, 0x9, 0x40000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400000000000000) 05:06:06 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffffffffff) 05:06:06 executing program 3: syz_clone(0x500ea080, 0x0, 0x0, 0x0, 0x0, 0x0) [ 666.618606] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:06:06 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) [ 666.773964] IPVS: ftp: loaded support on port[0] = 21 05:06:06 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:06 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x100000000000000) 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x600000000000000) 05:06:06 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = syz_clone(0x50800000, &(0x7f0000000000)="c7c809c973dc1e14d0562483dc9946d4eec33aabdce94722886dc9323fc0d0a6b5395a39b520b5b1f67f699e96123bf9feb825279f3c3f9b41d81a434435239b34891799c5c07e3db72c2710cea0cb7db80c2580", 0x54, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="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") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001180)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000240)={&(0x7f0000000140)=""/3, 0x3, 0x0, &(0x7f0000000180)=""/171, 0xab}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 05:06:06 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB="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"/387]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async, rerun: 32) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (rerun: 32) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) (async) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0}, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfff3}}}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000840)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) (async) r4 = socket(0x1000000010, 0x80002, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) 05:06:06 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000b80), 0x8) syz_clone(0x85081200, 0x0, 0x0, 0x0, 0x0, 0x0) [ 666.964936] IPVS: ftp: loaded support on port[0] = 21 05:06:06 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x700000000000000) 05:06:06 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x200000000000000) 05:06:06 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB="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"/387]) (async, rerun: 64) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) r1 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) r2 = socket(0x10, 0x803, 0x0) (async, rerun: 64) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0}, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x8}}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x4}}]}, 0x34}}, 0x0) (async, rerun: 32) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfff3}}}, 0x24}}, 0x0) (rerun: 32) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000840)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) (async) r4 = socket(0x1000000010, 0x80002, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x1c243911) 05:06:07 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 05:06:07 executing program 3: ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, 0x0) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) rmdir(&(0x7f0000000740)='./file0\x00') r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) r3 = add_key$keyring(&(0x7f00000006c0), &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="8af3a1ea3c072c059e4f21ccf9d89d0e4752b23b400c9dd9e8161991a4b8b64b3417d17a6ef15646e4db2567311fc8d1d0b5f4e6434c9729a36476b70fdcb59b268fa54db4d222e8ba6f226abea42faa89f4ed3db01f", 0x56, r3) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x6d}}, 0x0) 05:06:07 executing program 4: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 05:06:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x800000000000000) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x300000000000000) 05:06:07 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async, rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) rmdir(&(0x7f0000000740)='./file0\x00') r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) r3 = add_key$keyring(&(0x7f00000006c0), &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="8af3a1ea3c072c059e4f21ccf9d89d0e4752b23b400c9dd9e8161991a4b8b64b3417d17a6ef15646e4db2567311fc8d1d0b5f4e6434c9729a36476b70fdcb59b268fa54db4d222e8ba6f226abea42faa89f4ed3db01f", 0x56, r3) (async, rerun: 32) keyctl$set_reqkey_keyring(0xe, 0x1) (async, rerun: 32) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x6d}}, 0x0) 05:06:07 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) 05:06:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0xbc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa00000000000000) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x400000000000000) 05:06:07 executing program 5: syz_clone(0x22001200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x600000000000000) 05:06:07 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) rmdir(&(0x7f0000000740)='./file0\x00') (async) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) r3 = add_key$keyring(&(0x7f00000006c0), &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="8af3a1ea3c072c059e4f21ccf9d89d0e4752b23b400c9dd9e8161991a4b8b64b3417d17a6ef15646e4db2567311fc8d1d0b5f4e6434c9729a36476b70fdcb59b268fa54db4d222e8ba6f226abea42faa89f4ed3db01f", 0x56, r3) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) (async) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x6d}}, 0x0) 05:06:07 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\\$-\x00') 05:06:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc00000000000000) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x800000000000000) 05:06:07 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xa00000000000000) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r1) 05:06:07 executing program 3: syz_clone(0xde21818e8a5ab763, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe00000000000000) 05:06:07 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 4: syz_clone(0x801000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 05:06:07 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf00000000000000) 05:06:07 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) (async) add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r1) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xc00000000000000) 05:06:07 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) 05:06:07 executing program 5: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x186a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:06:07 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) (async) add_key$keyring(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r1) 05:06:07 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xe00000000000000) 05:06:07 executing program 3: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) 05:06:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000000000000) 05:06:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) 05:06:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, 0x0}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 05:06:08 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r1 = socket(0x5, 0xa, 0x4) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) mkdir(&(0x7f0000007cc0)='./file0\x00', 0x1c) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x80200, 0x0) connect$bt_sco(r1, &(0x7f0000007d00)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) recvmmsg(r2, &(0x7f0000007980)=[{{&(0x7f0000000600)=@hci, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/29, 0x1d}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/86, 0x56}, {&(0x7f0000000840)=""/195, 0xc3}, {&(0x7f0000000940)=""/222, 0xde}, {&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/70, 0x46}], 0x7, &(0x7f0000000b80)=""/224, 0xe0}, 0x8}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1, &(0x7f0000001cc0)=""/199, 0xc7}, 0x3}, {{&(0x7f0000001dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e40)=""/225, 0xe1}, {&(0x7f0000001f40)=""/81, 0x51}], 0x2, &(0x7f0000002000)=""/5, 0x5}, 0x2}, {{&(0x7f0000002040)=@nfc_llcp, 0x80, &(0x7f0000004240)=[{&(0x7f00000020c0)=""/156, 0x9c}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/78, 0x4e}, {&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)}], 0x5, &(0x7f00000042c0)=""/134, 0x86}, 0x7}, {{&(0x7f0000004380)=@hci, 0x80, &(0x7f0000004500)=[{&(0x7f0000004400)=""/255, 0xff}], 0x1, &(0x7f0000004540)=""/11, 0xb}, 0x4}, {{0x0, 0x0, &(0x7f0000006700)=[{&(0x7f0000004580)=""/220, 0xdc}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/125, 0x7d}, {&(0x7f0000005700)=""/4096, 0x1000}], 0x4, &(0x7f0000006740)=""/105, 0x69}, 0x8}, {{&(0x7f00000067c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000007940)=[{&(0x7f0000006840)=""/217, 0xd9}, {&(0x7f0000006940)=""/4096, 0x1000}], 0x2}, 0xfffffffb}], 0x7, 0x12120, &(0x7f0000007b40)={0x0, 0x3938700}) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r3, 0x10, 0x2, 0xc2) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004200), 0x240280, 0x0) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0xff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000007c00)={r2, r5, 0x0, 0x7b, &(0x7f0000007b80)="3c3f8566863a8cc06deeb2e5e4fe99cfa662ef9be9ff997d26c8cccd8991bbfb7344895684a10dadc73c5fdb636d27fe5ec1a9acdd407c18af8a0b66ed41991da55083a8e23830947c8d025bbe337766c72b2d91248d591ca3ceb5974693b3eb5e2dc50fa5cabb4630ad025bbeccbc5fcc147039318385f574750c", 0xca, 0x8, 0x12, 0x9, 0x4, 0x2, 0xf4d6, 'syz0\x00'}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r6 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r6, 0x3a, 0x0, 0x53c132ef) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x54}}, 0x0) 05:06:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x19, 0x0, 0x0) 05:06:08 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf00000000000000) 05:06:08 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3703000000000000) 05:06:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3e80}, 0x0) 05:06:08 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x1000000000000000) 05:06:08 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x5c05000000000000) 05:06:08 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 64) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r1 = socket(0x5, 0xa, 0x4) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) mkdir(&(0x7f0000007cc0)='./file0\x00', 0x1c) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x80200, 0x0) connect$bt_sco(r1, &(0x7f0000007d00)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) (async, rerun: 64) recvmmsg(r2, &(0x7f0000007980)=[{{&(0x7f0000000600)=@hci, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/29, 0x1d}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/86, 0x56}, {&(0x7f0000000840)=""/195, 0xc3}, {&(0x7f0000000940)=""/222, 0xde}, {&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/70, 0x46}], 0x7, &(0x7f0000000b80)=""/224, 0xe0}, 0x8}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1, &(0x7f0000001cc0)=""/199, 0xc7}, 0x3}, {{&(0x7f0000001dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e40)=""/225, 0xe1}, {&(0x7f0000001f40)=""/81, 0x51}], 0x2, &(0x7f0000002000)=""/5, 0x5}, 0x2}, {{&(0x7f0000002040)=@nfc_llcp, 0x80, &(0x7f0000004240)=[{&(0x7f00000020c0)=""/156, 0x9c}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/78, 0x4e}, {&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)}], 0x5, &(0x7f00000042c0)=""/134, 0x86}, 0x7}, {{&(0x7f0000004380)=@hci, 0x80, &(0x7f0000004500)=[{&(0x7f0000004400)=""/255, 0xff}], 0x1, &(0x7f0000004540)=""/11, 0xb}, 0x4}, {{0x0, 0x0, &(0x7f0000006700)=[{&(0x7f0000004580)=""/220, 0xdc}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/125, 0x7d}, {&(0x7f0000005700)=""/4096, 0x1000}], 0x4, &(0x7f0000006740)=""/105, 0x69}, 0x8}, {{&(0x7f00000067c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000007940)=[{&(0x7f0000006840)=""/217, 0xd9}, {&(0x7f0000006940)=""/4096, 0x1000}], 0x2}, 0xfffffffb}], 0x7, 0x12120, &(0x7f0000007b40)={0x0, 0x3938700}) (async, rerun: 64) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r3, 0x10, 0x2, 0xc2) (async, rerun: 32) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004200), 0x240280, 0x0) (async, rerun: 32) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0xff, 0x0, 0x0, 0x0) (async) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000007c00)={r2, r5, 0x0, 0x7b, &(0x7f0000007b80)="3c3f8566863a8cc06deeb2e5e4fe99cfa662ef9be9ff997d26c8cccd8991bbfb7344895684a10dadc73c5fdb636d27fe5ec1a9acdd407c18af8a0b66ed41991da55083a8e23830947c8d025bbe337766c72b2d91248d591ca3ceb5974693b3eb5e2dc50fa5cabb4630ad025bbeccbc5fcc147039318385f574750c", 0xca, 0x8, 0x12, 0x9, 0x4, 0x2, 0xf4d6, 'syz0\x00'}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r6 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r6, 0x3a, 0x0, 0x53c132ef) (async, rerun: 64) r7 = socket(0x1, 0x803, 0x0) (rerun: 64) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x54}}, 0x0) 05:06:08 executing program 3: syz_clone(0x7600040d, 0x0, 0x2000000, 0x0, 0x0, 0x0) 05:06:08 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3703000000000000) [ 668.460952] IPVS: ftp: loaded support on port[0] = 21 05:06:09 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) unlink(&(0x7f0000000080)='./file0\x00') 05:06:09 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 32) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r1 = socket(0x5, 0xa, 0x4) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) mkdir(&(0x7f0000007cc0)='./file0\x00', 0x1c) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x80200, 0x0) connect$bt_sco(r1, &(0x7f0000007d00)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) (async) recvmmsg(r2, &(0x7f0000007980)=[{{&(0x7f0000000600)=@hci, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/29, 0x1d}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/86, 0x56}, {&(0x7f0000000840)=""/195, 0xc3}, {&(0x7f0000000940)=""/222, 0xde}, {&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/70, 0x46}], 0x7, &(0x7f0000000b80)=""/224, 0xe0}, 0x8}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1, &(0x7f0000001cc0)=""/199, 0xc7}, 0x3}, {{&(0x7f0000001dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e40)=""/225, 0xe1}, {&(0x7f0000001f40)=""/81, 0x51}], 0x2, &(0x7f0000002000)=""/5, 0x5}, 0x2}, {{&(0x7f0000002040)=@nfc_llcp, 0x80, &(0x7f0000004240)=[{&(0x7f00000020c0)=""/156, 0x9c}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/78, 0x4e}, {&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)}], 0x5, &(0x7f00000042c0)=""/134, 0x86}, 0x7}, {{&(0x7f0000004380)=@hci, 0x80, &(0x7f0000004500)=[{&(0x7f0000004400)=""/255, 0xff}], 0x1, &(0x7f0000004540)=""/11, 0xb}, 0x4}, {{0x0, 0x0, &(0x7f0000006700)=[{&(0x7f0000004580)=""/220, 0xdc}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/125, 0x7d}, {&(0x7f0000005700)=""/4096, 0x1000}], 0x4, &(0x7f0000006740)=""/105, 0x69}, 0x8}, {{&(0x7f00000067c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000007940)=[{&(0x7f0000006840)=""/217, 0xd9}, {&(0x7f0000006940)=""/4096, 0x1000}], 0x2}, 0xfffffffb}], 0x7, 0x12120, &(0x7f0000007b40)={0x0, 0x3938700}) (async) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r3, 0x10, 0x2, 0xc2) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004200), 0x240280, 0x0) (async) r5 = socket(0x2, 0x3, 0xb) setsockopt(r5, 0xff, 0x0, 0x0, 0x0) (async) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000007c00)={r2, r5, 0x0, 0x7b, &(0x7f0000007b80)="3c3f8566863a8cc06deeb2e5e4fe99cfa662ef9be9ff997d26c8cccd8991bbfb7344895684a10dadc73c5fdb636d27fe5ec1a9acdd407c18af8a0b66ed41991da55083a8e23830947c8d025bbe337766c72b2d91248d591ca3ceb5974693b3eb5e2dc50fa5cabb4630ad025bbeccbc5fcc147039318385f574750c", 0xca, 0x8, 0x12, 0x9, 0x4, 0x2, 0xf4d6, 'syz0\x00'}) (async, rerun: 64) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async, rerun: 64) r6 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r6, 0x3a, 0x0, 0x53c132ef) (async) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r8}]}, 0x54}}, 0x0) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000000000000) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x3f06000000000000) 05:06:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 05:06:09 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0xd501, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xcb, &(0x7f0000000080)=""/203, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:06:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) close(r0) close(r0) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6000000000000000) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6558000000000000) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8100000000000000) 05:06:09 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:06:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f0000000180), 0x50) 05:06:09 executing program 4: syz_clone(0x58801000, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 05:06:09 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000840)=@md5={0x1, "37842609c13098539642a76f86d5a35e"}, 0x11, 0x1) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="ddd0a8ea36e2de8fb017722f047131f9e15b64636d8aec8be6fb2df00ec57eb39d971dd248129a7ffb96514dcc4cde304382221665e997fecfdde5d2d822970b877fa08fd0cf25e1104e56836fe824a30cf3eaa24b44d67f00fb1eefc223f130da8955f3954d00638e176c30e904561feec48c1315828b0780806b0325480078fca1490b8715f36987eb1dfd838678d7046c895e7a25df262b5d338d0ee651580a28d56fda8e1002ffc141e1ae88a99d0aecfed039c36522be30f786b0ef2980d405a4791e6efc2d63eed11577", 0xcd, r2) fallocate(r3, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) r5 = socket(0x1, 0x803, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, r1) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x54}}, 0x0) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x6558000000000000) 05:06:09 executing program 3: syz_clone(0xa0080, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff00000000) 05:06:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000180), 0x50) 05:06:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="97", 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) close(r1) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff00000000) 05:06:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2d, &(0x7f0000000180), 0x50) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x8100000000000000) 05:06:09 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (rerun: 32) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async, rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) lsetxattr$security_ima(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000840)=@md5={0x1, "37842609c13098539642a76f86d5a35e"}, 0x11, 0x1) (async, rerun: 32) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async, rerun: 64) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="ddd0a8ea36e2de8fb017722f047131f9e15b64636d8aec8be6fb2df00ec57eb39d971dd248129a7ffb96514dcc4cde304382221665e997fecfdde5d2d822970b877fa08fd0cf25e1104e56836fe824a30cf3eaa24b44d67f00fb1eefc223f130da8955f3954d00638e176c30e904561feec48c1315828b0780806b0325480078fca1490b8715f36987eb1dfd838678d7046c895e7a25df262b5d338d0ee651580a28d56fda8e1002ffc141e1ae88a99d0aecfed039c36522be30f786b0ef2980d405a4791e6efc2d63eed11577", 0xcd, r2) (async, rerun: 32) fallocate(r3, 0x10, 0x2, 0xc2) (async, rerun: 32) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) r5 = socket(0x1, 0x803, 0x0) (async, rerun: 64) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, r1) (rerun: 64) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x54}}, 0x0) 05:06:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2f, &(0x7f0000000180), 0x50) 05:06:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/225, 0x29, 0xe1, 0x1}, 0x20) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff00000000) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x88a8ffff00000000) 05:06:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/225, 0x1a, 0xe1, 0x1}, 0x20) 05:06:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 05:06:09 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async, rerun: 64) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) r1 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), &(0x7f0000000840)=@md5={0x1, "37842609c13098539642a76f86d5a35e"}, 0x11, 0x1) (async) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async, rerun: 64) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) (async, rerun: 32) add_key$user(&(0x7f0000000140), &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="ddd0a8ea36e2de8fb017722f047131f9e15b64636d8aec8be6fb2df00ec57eb39d971dd248129a7ffb96514dcc4cde304382221665e997fecfdde5d2d822970b877fa08fd0cf25e1104e56836fe824a30cf3eaa24b44d67f00fb1eefc223f130da8955f3954d00638e176c30e904561feec48c1315828b0780806b0325480078fca1490b8715f36987eb1dfd838678d7046c895e7a25df262b5d338d0ee651580a28d56fda8e1002ffc141e1ae88a99d0aecfed039c36522be30f786b0ef2980d405a4791e6efc2d63eed11577", 0xcd, r2) (async, rerun: 32) fallocate(r3, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x3a, 0x0, 0x53c132ef) (async) r5 = socket(0x1, 0x803, 0x0) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, r1) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x54}}, 0x0) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0x9effffff00000000) 05:06:09 executing program 5: syz_clone(0x40b80400, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000038c0)={0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000000080)="d195caa148066f9c9da8de9cb83b3391f22b77b67f03df016a2f0df9bc668f626438efcacbf0c10f658b15888197afcc29974e19e6ca62b4ba72c8a7e88fe3742c2617e2653351992e7034617b9c9ca16a7a87b00e38e132e8dc9bf0122899ca8488a59eced39316606d02ab21b6a9580a91fedc3d655da489892a95a723c7c021949d5579fca4f5d26aa0486c1662bf73be8f6aa495d992c324456763b79d77e5a4830165e5ab4bf829185742c4c38d771adb5adcc42f88df1cce8eb98c4121aabff0c36f", 0xc5}, {&(0x7f0000000180)="a83795c71466c97a3f0a8ac81012875024f443b7309958ef3304ddb3c601074b8a6e47eb2ef95a7045df6e93fda4f984ec91442805f438ba759b4018451f8873999737521eeed3811e7f85cff7d80da8c74a8bf3dda41aff2cf40aad8cfcf4", 0x5f}, {&(0x7f0000000200)="7c44db0e6059c756e0ed69a5672a664487fa49dc1fe60d93f147042dab01ed3769a27b89fc1c0fee40b6f61d01ebaacf7d46e6042e3e5cbf4774fdc461f99a01859ac1e3b6328992a1797bf6b11096aad0ef996d9570b1d21000c1baad3c1adffd5c490869d8f245c2b32046153aa6255cbe8ed998f8e2ef82f97fc5f292ecf1ce23c29b89606fdf094e583ac2a1347ca6da5556b9a4cb8f8f96ed577c42abe1280ef2d5887fc542", 0xa8}, {&(0x7f00000002c0)="fbb68b04beaae4a578f02a11d580c8dd09ae33a27e4f", 0x16}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000002300)="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", 0xcde}, {&(0x7f0000003300)='V', 0x1}], 0x8}, 0x0) 05:06:09 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff000000000000) 05:06:09 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xf0ffffff00000000) 05:06:09 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000222e2f66696c653080"]) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0xb7c) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) [ 670.077275] IPVS: ftp: loaded support on port[0] = 21 05:06:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 05:06:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x2) close(r1) 05:06:10 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f000000000000) 05:06:10 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfeff000000000000) 05:06:10 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 05:06:10 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000222e2f66696c653080"]) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0xb7c) (async) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) 05:06:10 executing program 5: syz_clone(0x76000440, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:06:10 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000222e2f66696c653080"]) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0xb7c) (async) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) 05:06:10 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f00000000) 05:06:10 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xff0f000000000000) 05:06:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x20) 05:06:10 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x2, 0x3, 0xb) setsockopt(r1, 0xff, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/124, 0x7c}], 0x1, &(0x7f0000000780)=""/185, 0xb9}, 0x2000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r2, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@ipv6_getanyicast={0x14, 0x3e, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xd1a53de182a1e37b}, 0x1) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) [ 670.440756] IPVS: ftp: loaded support on port[0] = 21 05:06:10 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xc, &(0x7f0000000180), 0x50) 05:06:10 executing program 3: syz_clone(0x58801000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:10 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="6390bcd6ad463d05aaa8f47c8c188aeb0200cf67b9dd2671331889f51cacb62d9e8043d0d76cc98d326e2e63213fb625e7b35fdbc9501531889da21880d4dd1a5db06c0936665c80dfdf935cf3e21e9626e8c7c3f0cb575ee391c6d78cb8e99f68fea05ffc0f2661552af247d8ea4373590ae01a5c8e06d00400a67adf35001caa7a6d7c887b85a81a8befdfc0fe1146f47bd6af0dcb2cfeff7f7e0492d598b770926ff661d9eb2d8a36073399013acc762fcfef0fc98ce4b72113a37ca4e25c757c1d9a5b80b9941c63bdfd42981fdee77ec857185434ad11efbb100faf5a845dfdb5a2cd684e4ea581303fe48e70719f4db7a39c14508da15d75ff6d31ee82d2644fbc6c155816890a764881aa72b0510ff4df5a6ce9fb03360f4736cd218426947b1e8c26cb75da51594b4f598b367cc5fe93b51ba3a9e700f969e087ac20d570cab30edb1d7e06ddb633043c5255c1f95bdd89daea403b4fdc2dcb6c5385505d864761e22b8db4936aa129bd39d468c1775aa6feaab06249eb96b98b65a64fee029f05d05c27693b"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffff7f00000000) 05:06:10 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xffffffff00000000) 05:06:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/225, 0x29, 0xe1, 0x1}, 0x20) 05:06:10 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket(0x2, 0x3, 0xb) setsockopt(r1, 0xff, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/124, 0x7c}], 0x1, &(0x7f0000000780)=""/185, 0xb9}, 0x2000) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async) keyctl$set_reqkey_keyring(0xe, 0x1) (async) fallocate(r2, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@ipv6_getanyicast={0x14, 0x3e, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xd1a53de182a1e37b}, 0x1) (async) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) 05:06:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="97", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x2) 05:06:10 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffffffffff000) 05:06:10 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0x54}}, 0xfffffffffffff000) 05:06:10 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket(0x2, 0x3, 0xb) setsockopt(r1, 0xff, 0x0, 0x0, 0x0) (async) recvmsg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/124, 0x7c}], 0x1, &(0x7f0000000780)=""/185, 0xb9}, 0x2000) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) (async) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)) (async, rerun: 32) keyctl$set_reqkey_keyring(0xe, 0x1) (rerun: 32) fallocate(r2, 0x10, 0x2, 0xc2) (async) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r3, 0x3a, 0x0, 0x53c132ef) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@ipv6_getanyicast={0x14, 0x3e, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xd1a53de182a1e37b}, 0x1) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) 05:06:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x8}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0xcb, &(0x7f0000000080)=""/203, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 671.021073] IPVS: ftp: loaded support on port[0] = 21 05:06:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1a, &(0x7f0000000180), 0x50) 05:06:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000040)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000000)={r5}, &(0x7f0000000080)=0x8) 05:06:11 executing program 1: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000006c0)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=@newlink={0xc0, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x88, 0x2, 0x0, 0x1, [@IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}, @IFLA_BATADV_ALGO_NAME={0xc, 0x1, 'BATMAN_V'}, @IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}, @IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}, @IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}, @IFLA_BATADV_ALGO_NAME={0xc, 0x1, 'BATMAN_V'}, @IFLA_BATADV_ALGO_NAME={0xc, 0x1, 'BATMAN_V'}, @IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}, @IFLA_BATADV_ALGO_NAME={0xd, 0x1, 'BATMAN_IV'}]}}}, @IFLA_MASTER={0x8, 0x3, r4}]}, 0xc0}}, 0x0) 05:06:11 executing program 2: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x78) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000600)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) bpf$ITER_CREATE(0x21, &(0x7f0000000640)={r3}, 0x8) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x2, 0x3, 0xb) setsockopt(r6, 0xff, 0x0, 0x0, 0x0) fallocate(r1, 0x4a, 0x7, 0x4e) bind$inet(r6, &(0x7f0000000680)={0x2, 0x4e21, @remote}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x54}}, 0x0) 05:06:11 executing program 5: syz_clone(0x128a5080, 0x0, 0x0, 0x0, 0x0, 0x0) 05:06:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x9, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 05:06:11 executing program 0: ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f00000003c0)={0x0}) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000, 0x0, 0x2, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="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"]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={0x0, 0x6c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x20004044) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0xe, 0x1) fallocate(r1, 0x10, 0x2, 0xc2) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(0xffffffffffffffff, 0x4008941a, &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r2, 0x3a, 0x0, 0x53c132ef) r3 = socket(0x1, 0x803, 0x0) r4 = socket(0x2, 0x3, 0xb) setsockopt(r4, 0xff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_IFINDEX={0x8}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x4c, r6, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @private1}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010100}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80000}, 0x40d4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x401, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x10041}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_GRE_FWMARK={0x8, 0x14, 0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x81}]}}}, @IFLA_MASTER={0x8, 0x3, r7}]}, 0x54}}, 0x0) 05:06:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1}, 0x10) 05:06:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0xfeff, 0x0, 0x9}, 0x8) 05:06:11 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) 05:06:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 671.541129] ------------[ cut here ]------------ [ 671.547933] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 671.558349] WARNING: CPU: 0 PID: 12184 at lib/debugobjects.c:325 debug_print_object+0x160/0x250 [ 671.567194] Kernel panic - not syncing: panic_on_warn set ... [ 671.567194] [ 671.574566] CPU: 0 PID: 12184 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 671.582533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 05:06:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0x0, 0x401, 0x0, 0x2}, 0x8) 05:06:11 executing program 5: syz_clone(0xa1081280, 0x0, 0x0, 0x0, 0x0, 0x0) [ 671.591886] Call Trace: [ 671.594482] dump_stack+0x1fc/0x2ef [ 671.598117] panic+0x26a/0x50e [ 671.601324] ? __warn_printk+0xf3/0xf3 [ 671.605224] ? debug_print_object+0x160/0x250 [ 671.609725] ? __probe_kernel_read+0x130/0x1b0 [ 671.614309] ? __warn.cold+0x5/0x5a [ 671.618026] ? debug_print_object+0x160/0x250 [ 671.622528] __warn.cold+0x20/0x5a [ 671.626071] ? debug_print_object+0x160/0x250 [ 671.630564] report_bug+0x262/0x2b0 [ 671.634193] do_error_trap+0x1d7/0x310 [ 671.638081] ? math_error+0x310/0x310 [ 671.641890] ? irq_work_claim+0xa6/0xc0 [ 671.645877] ? irq_work_queue+0x29/0x80 [ 671.649854] ? error_entry+0x72/0xd0 [ 671.653569] ? trace_hardirqs_off_caller+0x2c/0x210 [ 671.658586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.663443] invalid_op+0x14/0x20 [ 671.666907] RIP: 0010:debug_print_object+0x160/0x250 [ 671.672005] Code: dd 20 f1 b3 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 00 00 00 48 8b 14 dd 20 f1 b3 88 48 c7 c7 40 e5 b3 88 e8 65 92 7b 04 <0f> 0b 83 05 73 e6 af 07 01 48 83 c4 20 5b 5d 41 5c 41 5d c3 48 89 [ 671.690912] RSP: 0018:ffff88803dcf6f08 EFLAGS: 00010086 [ 671.696255] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 671.703673] RDX: 0000000000040000 RSI: ffffffff814dff01 RDI: ffffed1007b9edd3 [ 671.710919] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 671.718167] R10: 0000000000000005 R11: ffffffff8c66501b R12: ffffffff89f90a40 [ 671.725420] R13: ffffffff815313f0 R14: ffff8880ab8a6498 R15: dffffc0000000000 [ 671.732676] ? calc_wheel_index+0x230/0x230 [ 671.736981] ? vprintk_func+0x81/0x180 [ 671.740855] ? debug_print_object+0x160/0x250 [ 671.745324] ? __free_object+0xdd/0x1e0 [ 671.749285] debug_check_no_obj_freed+0x271/0x490 [ 671.754120] kfree+0xb9/0x210 [ 671.757210] ? xps_rxqs_show+0x6f0/0x6f0 [ 671.761252] kvfree+0x59/0x60 [ 671.764351] device_release+0x76/0x210 [ 671.768214] ? device_remove_bin_file+0x30/0x30 [ 671.772863] kobject_put+0x28b/0x5d0 [ 671.776558] put_device+0x1c/0x30 [ 671.779986] free_netdev+0x309/0x410 [ 671.783686] rtnl_newlink+0x13a3/0x15c0 [ 671.787638] ? rtnl_getlink+0x620/0x620 [ 671.791593] ? __lock_acquire+0x6de/0x3ff0 [ 671.795804] ? mark_held_locks+0xf0/0xf0 [ 671.799851] ? unwind_next_frame+0xeee/0x1400 [ 671.804322] ? __save_stack_trace+0x72/0x190 [ 671.808712] ? deref_stack_reg+0x134/0x1d0 [ 671.812940] ? get_reg+0x176/0x1f0 [ 671.816458] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 671.822319] ? deref_stack_reg+0x1d0/0x1d0 [ 671.826537] ? mark_held_locks+0xf0/0xf0 [ 671.830575] ? is_bpf_text_address+0xd5/0x1b0 [ 671.835049] ? lock_downgrade+0x720/0x720 [ 671.839175] ? lock_acquire+0x170/0x3c0 [ 671.843141] ? __bpf_address_lookup+0x330/0x330 [ 671.847798] ? check_preemption_disabled+0x41/0x280 [ 671.852800] ? is_bpf_text_address+0xfc/0x1b0 [ 671.857274] ? kernel_text_address+0xbd/0xf0 [ 671.861661] ? __kernel_text_address+0x9/0x30 [ 671.866235] ? unwind_get_return_address+0x51/0x90 [ 671.871146] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.876494] ? __save_stack_trace+0xaf/0x190 [ 671.880888] ? __lock_acquire+0x6de/0x3ff0 [ 671.885115] ? __kasan_slab_free+0x186/0x1f0 [ 671.889500] ? kmem_cache_free+0x7f/0x260 [ 671.893634] ? kfree_skbmem+0xc1/0x140 [ 671.897506] ? consume_skb+0x120/0x3d0 [ 671.901373] ? mark_held_locks+0xf0/0xf0 [ 671.905412] ? netlink_deliver_tap+0x8fb/0xb00 [ 671.909971] ? netlink_unicast+0x545/0x690 [ 671.914194] ? netlink_sendmsg+0x6c3/0xc50 [ 671.918410] ? sock_sendmsg+0xc3/0x120 [ 671.922365] ? ___sys_sendmsg+0x7bb/0x8e0 [ 671.926499] ? __x64_sys_sendmsg+0x132/0x220 [ 671.930917] ? do_syscall_64+0xf9/0x620 [ 671.934879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.940232] ? mutex_trylock+0x1a0/0x1a0 [ 671.944280] ? check_preemption_disabled+0x41/0x280 [ 671.949284] ? rtnl_getlink+0x620/0x620 [ 671.953234] rtnetlink_rcv_msg+0x453/0xb80 [ 671.957446] ? rtnl_calcit.isra.0+0x430/0x430 [ 671.961918] ? memcpy+0x35/0x50 [ 671.965190] ? netdev_pick_tx+0x2f0/0x2f0 [ 671.969314] ? __copy_skb_header+0x414/0x500 [ 671.973705] ? kfree_skbmem+0x140/0x140 [ 671.977655] netlink_rcv_skb+0x160/0x440 [ 671.981692] ? rtnl_calcit.isra.0+0x430/0x430 [ 671.986164] ? netlink_ack+0xae0/0xae0 [ 671.990039] netlink_unicast+0x4d5/0x690 [ 671.994090] ? netlink_sendskb+0x110/0x110 [ 671.998312] ? _copy_from_iter_full+0x229/0x7c0 [ 672.002969] ? __phys_addr_symbol+0x2c/0x70 [ 672.007285] ? __check_object_size+0x17b/0x3e0 [ 672.011863] netlink_sendmsg+0x6c3/0xc50 [ 672.015907] ? aa_af_perm+0x230/0x230 [ 672.019697] ? nlmsg_notify+0x1f0/0x1f0 [ 672.023770] ? write_comp_data+0x16/0x70 [ 672.027825] ? nlmsg_notify+0x1f0/0x1f0 [ 672.031781] sock_sendmsg+0xc3/0x120 [ 672.035497] ___sys_sendmsg+0x7bb/0x8e0 [ 672.039451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 672.044187] ? copy_msghdr_from_user+0x440/0x440 [ 672.048922] ? __fget+0x32f/0x510 [ 672.052372] ? lock_downgrade+0x720/0x720 [ 672.056509] ? check_preemption_disabled+0x41/0x280 [ 672.061506] ? check_preemption_disabled+0x41/0x280 [ 672.066597] ? __fget+0x356/0x510 [ 672.070040] ? do_dup2+0x450/0x450 [ 672.073567] ? _copy_to_user+0xb8/0x100 [ 672.077532] ? __fdget+0x1d0/0x230 [ 672.081064] __x64_sys_sendmsg+0x132/0x220 [ 672.085365] ? __sys_sendmsg+0x1b0/0x1b0 [ 672.089688] ? __se_sys_futex+0x298/0x3b0 [ 672.094062] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.099548] ? trace_hardirqs_off_caller+0x6e/0x210 [ 672.104634] ? do_syscall_64+0x21/0x620 [ 672.108677] do_syscall_64+0xf9/0x620 [ 672.112460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.117640] RIP: 0033:0x7fac823d10c9 [ 672.121467] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 672.140466] RSP: 002b:00007fac80943168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 672.148175] RAX: ffffffffffffffda RBX: 00007fac824f0f80 RCX: 00007fac823d10c9 [ 672.155514] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000006 [ 672.162767] RBP: 00007fac8242cae9 R08: 0000000000000000 R09: 0000000000000000 [ 672.170019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 672.177266] R13: 00007fff81ea760f R14: 00007fac80943300 R15: 0000000000022000 [ 672.184517] [ 672.184520] ====================================================== [ 672.184523] WARNING: possible circular locking dependency detected [ 672.184525] 4.19.211-syzkaller #0 Not tainted [ 672.184528] ------------------------------------------------------ [ 672.184531] syz-executor.1/12184 is trying to acquire lock: [ 672.184532] 000000009c800ef3 ((console_sem).lock){-...}, at: down_trylock+0xe/0x60 [ 672.184539] [ 672.184541] but task is already holding lock: [ 672.184543] 00000000a250babb (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xb5/0x490 [ 672.184550] [ 672.184553] which lock already depends on the new lock. [ 672.184554] [ 672.184555] [ 672.184557] the existing dependency chain (in reverse order) is: [ 672.184559] [ 672.184560] -> #5 (&obj_hash[i].lock){-.-.}: [ 672.184567] debug_object_activate+0x12f/0x450 [ 672.184569] enqueue_hrtimer+0x27/0x3d0 [ 672.184573] hrtimer_start_range_ns+0x70a/0xd60 [ 672.184576] watchdog_enable+0x13b/0x1f0 [ 672.184579] softlockup_start_fn+0x11/0x20 [ 672.184583] smp_call_on_cpu_callback+0xde/0x1f0 [ 672.184587] process_one_work+0x864/0x1570 [ 672.184591] worker_thread+0x64c/0x1130 [ 672.184594] kthread+0x33f/0x460 [ 672.184597] ret_from_fork+0x24/0x30 [ 672.184599] [ 672.184601] -> #4 (hrtimer_bases.lock){-.-.}: [ 672.184616] hrtimer_start_range_ns+0xe6/0xd60 [ 672.184619] enqueue_task_rt+0x5a4/0xea0 [ 672.184624] __sched_setscheduler.constprop.0+0xd9c/0x20a0 [ 672.184628] do_sched_setscheduler+0x155/0x290 [ 672.184632] __x64_sys_sched_setscheduler+0x73/0xb0 [ 672.184636] do_syscall_64+0xf9/0x620 [ 672.184640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.184642] [ 672.184644] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 672.184652] rq_online_rt+0xaf/0x390 [ 672.184654] set_rq_online.part.0+0xe0/0x130 [ 672.184656] sched_cpu_activate+0x173/0x280 [ 672.184659] cpuhp_invoke_callback+0x201/0x1b80 [ 672.184661] cpuhp_thread_fun+0x467/0x850 [ 672.184663] smpboot_thread_fn+0x655/0x9e0 [ 672.184665] kthread+0x33f/0x460 [ 672.184667] ret_from_fork+0x24/0x30 [ 672.184668] [ 672.184669] -> #2 (&rq->lock){-.-.}: [ 672.184675] task_fork_fair+0x6a/0x4c0 [ 672.184677] sched_fork+0x3d5/0xb70 [ 672.184679] copy_process.part.0+0x1884/0x8260 [ 672.184681] _do_fork+0x22f/0xf30 [ 672.184683] kernel_thread+0x2f/0x40 [ 672.184685] rest_init+0x1f/0x323 [ 672.184687] start_kernel+0x8d6/0x911 [ 672.184689] secondary_startup_64+0xa4/0xb0 [ 672.184690] [ 672.184691] -> #1 (&p->pi_lock){-.-.}: [ 672.184698] try_to_wake_up+0x7b/0x1050 [ 672.184699] up+0x75/0xb0 [ 672.184701] __up_console_sem+0xb3/0x1c0 [ 672.184703] console_unlock+0x633/0x1110 [ 672.184705] vt_ioctl+0x1898/0x2380 [ 672.184707] tty_ioctl+0x5b0/0x1630 [ 672.184709] do_vfs_ioctl+0xcdb/0x12e0 [ 672.184711] ksys_ioctl+0x9b/0xc0 [ 672.184713] __x64_sys_ioctl+0x6f/0xb0 [ 672.184715] do_syscall_64+0xf9/0x620 [ 672.184718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.184719] [ 672.184720] -> #0 ((console_sem).lock){-...}: [ 672.184727] _raw_spin_lock_irqsave+0x8c/0xc0 [ 672.184729] down_trylock+0xe/0x60 [ 672.184731] __down_trylock_console_sem+0xa3/0x210 [ 672.184733] vprintk_emit+0x283/0x740 [ 672.184735] vprintk_func+0x79/0x180 [ 672.184737] printk+0xba/0xed [ 672.184739] __warn_printk+0x9b/0xf3 [ 672.184741] debug_print_object+0x160/0x250 [ 672.184743] debug_check_no_obj_freed+0x271/0x490 [ 672.184745] kfree+0xb9/0x210 [ 672.184747] kvfree+0x59/0x60 [ 672.184748] device_release+0x76/0x210 [ 672.184750] kobject_put+0x28b/0x5d0 [ 672.184752] put_device+0x1c/0x30 [ 672.184754] free_netdev+0x309/0x410 [ 672.184756] rtnl_newlink+0x13a3/0x15c0 [ 672.184758] rtnetlink_rcv_msg+0x453/0xb80 [ 672.184760] netlink_rcv_skb+0x160/0x440 [ 672.184762] netlink_unicast+0x4d5/0x690 [ 672.184764] netlink_sendmsg+0x6c3/0xc50 [ 672.184766] sock_sendmsg+0xc3/0x120 [ 672.184768] ___sys_sendmsg+0x7bb/0x8e0 [ 672.184770] __x64_sys_sendmsg+0x132/0x220 [ 672.184772] do_syscall_64+0xf9/0x620 [ 672.184774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.184775] [ 672.184777] other info that might help us debug this: [ 672.184778] [ 672.184780] Chain exists of: [ 672.184781] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 672.184790] [ 672.184792] Possible unsafe locking scenario: [ 672.184793] [ 672.184795] CPU0 CPU1 [ 672.184797] ---- ---- [ 672.184799] lock(&obj_hash[i].lock); [ 672.184803] lock(hrtimer_bases.lock); [ 672.184808] lock(&obj_hash[i].lock); [ 672.184812] lock((console_sem).lock); [ 672.184816] [ 672.184817] *** DEADLOCK *** [ 672.184818] [ 672.184820] 2 locks held by syz-executor.1/12184: [ 672.184821] #0: 0000000016486533 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 [ 672.184829] #1: 00000000a250babb (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xb5/0x490 [ 672.184838] [ 672.184839] stack backtrace: [ 672.184843] CPU: 0 PID: 12184 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 672.184846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 672.184848] Call Trace: [ 672.184850] dump_stack+0x1fc/0x2ef [ 672.184852] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 672.184854] __lock_acquire+0x30c9/0x3ff0 [ 672.184856] ? format_decode+0x230/0xad0 [ 672.184858] ? mark_held_locks+0xf0/0xf0 [ 672.184861] ? enable_ptr_key_workfn+0x30/0x30 [ 672.184862] ? memcpy+0x35/0x50 [ 672.184864] ? kvm_sched_clock_read+0x14/0x40 [ 672.184866] ? sched_clock+0x2a/0x40 [ 672.184868] ? sched_clock_cpu+0x18/0x1b0 [ 672.184870] lock_acquire+0x170/0x3c0 [ 672.184872] ? down_trylock+0xe/0x60 [ 672.184874] ? vprintk_func+0x79/0x180 [ 672.184876] _raw_spin_lock_irqsave+0x8c/0xc0 [ 672.184878] ? down_trylock+0xe/0x60 [ 672.184880] down_trylock+0xe/0x60 [ 672.184882] ? vprintk_func+0x79/0x180 [ 672.184884] ? vprintk_func+0x79/0x180 [ 672.184886] __down_trylock_console_sem+0xa3/0x210 [ 672.184888] vprintk_emit+0x283/0x740 [ 672.184890] ? calc_wheel_index+0x230/0x230 [ 672.184892] vprintk_func+0x79/0x180 [ 672.184894] printk+0xba/0xed [ 672.184896] ? log_store.cold+0x16/0x16 [ 672.184898] ? __warn_printk+0x8f/0xf3 [ 672.184900] ? work_on_cpu_safe+0x90/0x90 [ 672.184902] __warn_printk+0x9b/0xf3 [ 672.184903] ? add_taint.cold+0x16/0x16 [ 672.184906] ? lock_downgrade+0x720/0x720 [ 672.184909] ? lock_acquire+0x170/0x3c0 [ 672.184911] ? __free_object+0x17/0x1e0 [ 672.184913] ? work_on_cpu_safe+0x90/0x90 [ 672.184915] debug_print_object+0x160/0x250 [ 672.184917] ? __free_object+0xdd/0x1e0 [ 672.184920] debug_check_no_obj_freed+0x271/0x490 [ 672.184921] kfree+0xb9/0x210 [ 672.184923] ? xps_rxqs_show+0x6f0/0x6f0 [ 672.184925] kvfree+0x59/0x60 [ 672.184927] device_release+0x76/0x210 [ 672.184929] ? device_remove_bin_file+0x30/0x30 [ 672.184931] kobject_put+0x28b/0x5d0 [ 672.184933] put_device+0x1c/0x30 [ 672.184934] free_netdev+0x309/0x410 [ 672.184936] rtnl_newlink+0x13a3/0x15c0 [ 672.184938] ? rtnl_getlink+0x620/0x620 [ 672.184940] ? __lock_acquire+0x6de/0x3ff0 [ 672.184942] ? mark_held_locks+0xf0/0xf0 [ 672.184944] ? unwind_next_frame+0xeee/0x1400 [ 672.184947] ? __save_stack_trace+0x72/0x190 [ 672.184949] ? deref_stack_reg+0x134/0x1d0 [ 672.184950] ? get_reg+0x176/0x1f0 [ 672.184953] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 672.184955] ? deref_stack_reg+0x1d0/0x1d0 [ 672.184957] ? mark_held_locks+0xf0/0xf0 [ 672.184959] ? is_bpf_text_address+0xd5/0x1b0 [ 672.184961] ? lock_downgrade+0x720/0x720 [ 672.184963] ? lock_acquire+0x170/0x3c0 [ 672.184965] ? __bpf_address_lookup+0x330/0x330 [ 672.184967] ? check_preemption_disabled+0x41/0x280 [ 672.184970] ? is_bpf_text_address+0xfc/0x1b0 [ 672.184972] ? kernel_text_address+0xbd/0xf0 [ 672.184974] ? __kernel_text_address+0x9/0x30 [ 672.184976] ? unwind_get_return_address+0x51/0x90 [ 672.184978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.184981] ? __save_stack_trace+0xaf/0x190 [ 672.184983] ? __lock_acquire+0x6de/0x3ff0 [ 672.184985] ? __kasan_slab_free+0x186/0x1f0 [ 672.184987] ? kmem_cache_free+0x7f/0x260 [ 672.184989] ? kfree_skbmem+0xc1/0x140 [ 672.184991] ? consume_skb+0x120/0x3d0 [ 672.184993] ? mark_held_locks+0xf0/0xf0 [ 672.184995] ? netlink_deliver_tap+0x8fb/0xb00 [ 672.184997] ? netlink_unicast+0x545/0x690 [ 672.184999] ? netlink_sendmsg+0x6c3/0xc50 [ 672.185001] ? sock_sendmsg+0xc3/0x120 [ 672.185003] ? ___sys_sendmsg+0x7bb/0x8e0 [ 672.185005] ? __x64_sys_sendmsg+0x132/0x220 [ 672.185007] ? do_syscall_64+0xf9/0x620 [ 672.185010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.185012] ? mutex_trylock+0x1a0/0x1a0 [ 672.185014] ? check_preemption_disabled+0x41/0x280 [ 672.185016] ? rtnl_getlink+0x620/0x620 [ 672.185018] rtnetlink_rcv_msg+0x453/0xb80 [ 672.185020] ? rtnl_calcit.isra.0+0x430/0x430 [ 672.185022] ? memcpy+0x35/0x50 [ 672.185024] ? netdev_pick_tx+0x2f0/0x2f0 [ 672.185026] ? __copy_skb_header+0x414/0x500 [ 672.185028] ? kfree_skbmem+0x140/0x140 [ 672.185030] netlink_rcv_skb+0x160/0x440 [ 672.185032] ? rtnl_calcit.isra.0+0x430/0x430 [ 672.185034] ? netlink_ack+0xae0/0xae0 [ 672.185036] netlink_unicast+0x4d5/0x690 [ 672.185038] ? netlink_sendskb+0x110/0x110 [ 672.185040] ? _copy_from_iter_full+0x229/0x7c0 [ 672.185042] ? __phys_addr_symbol+0x2c/0x70 [ 672.185044] ? __check_object_size+0x17b/0x3e0 [ 672.185046] netlink_sendmsg+0x6c3/0xc50 [ 672.185048] ? aa_af_perm+0x230/0x230 [ 672.185050] ? nlmsg_notify+0x1f0/0x1f0 [ 672.185052] ? write_comp_data+0x16/0x70 [ 672.185054] ? nlmsg_notify+0x1f0/0x1f0 [ 672.185056] sock_sendmsg+0xc3/0x120 [ 672.185058] ___sys_sendmsg+0x7bb/0x8e0 [ 672.185060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 672.185062] ? copy_msghdr_from_user+0x440/0x440 [ 672.185064] ? __fget+0x32f/0x510 [ 672.185066] ? lock_downgrade+0x720/0x720 [ 672.185069] ? check_preemption_disabled+0x41/0x280 [ 672.185071] ? check_preemption_disabled+0x41/0x280 [ 672.185073] ? __fget+0x356/0x510 [ 672.185075] ? do_dup2+0x450/0x450 [ 672.185078] ? _copy_to_user+0xb8/0x100 [ 672.185080] ? __fdget+0x1d0/0x230 [ 672.185084] __x64_sys_sendmsg+0x132/0x220 [ 672.185087] ? __sys_sendmsg+0x1b0/0x1b0 [ 672.185091] ? __se_sys_futex+0x298/0x3b0 [ 672.185095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.185099] ? trace_hardirqs_off_caller+0x6e/0x210 [ 672.185103] ? do_syscall_64+0x21/0x620 [ 672.185105] do_syscall_64+0xf9/0x620 [ 672.185108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.185109] RIP: 0033:0x7fac823d10c9 [ 672.185114] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 [ 672.185118] Lost 7 message(s)! [ 672.185304] Kernel Offset: disabled [ 673.241839] Rebooting in 86400 seconds..