0e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000005c0)={r1}) mount(&(0x7f0000001c00)=@filename='./file0//ile0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='xfs\x00', 0x0, &(0x7f0000001cc0)='\x00') 03:37:41 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffdabe0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x18}}, 0x0) 03:37:41 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fffffdfd000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:41 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffc90000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x52}}, 0x0) 03:37:41 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0x0, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:41 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000045520000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0xc0}}, 0x0) 03:37:41 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffee0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0xec0}}, 0x0) 03:37:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter\x00') readv(r0, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 03:37:41 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000407ff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0x0, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x33fe0}}, 0x0) 03:37:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|\x80g\x94\x81\x99W*\f+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY\xc0\xcb-\xa4\x93\xabr\nr\xa6\xdbc\xfc\x94\xc0\x81rV\xce\xb3\x84\x90\\\x85\xa7\xe5\n') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x40000000000000dd) 03:37:41 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000005b0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:41 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffff40000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x200000e4}}, 0x0) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:41 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000fff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x7ffff000}}, 0x0) 03:37:41 executing program 0: epoll_create1(0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x8000000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) recvmmsg(r1, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x8, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x0, 0x0) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:42 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffff50000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0xfffffdef}}, 0x0) 03:37:42 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000680000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x2}, 0x0) 03:37:42 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f00000000c0)) 03:37:42 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000bedaffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x3}, 0x0) 03:37:42 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffff60000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x0, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x4}, 0x0) 03:37:42 executing program 0: syz_execute_func(&(0x7f0000000380)="ba42440fe4f564ff0941c342c4c27d794e0066420fe27fe3f245dd0111103e66410f3a0ff4038c4219") clone(0x8000000204, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000280)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, 0x0) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x0, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x8}, 0x0) 03:37:42 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x9}, 0x0) 03:37:42 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000407f80000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:42 executing program 0: 03:37:42 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fcfdffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0xb}, 0x0) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x0, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:42 executing program 0: 03:37:42 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffffb0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:43 executing program 0: 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x25}, 0x0) 03:37:43 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000740000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:43 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffdfc0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x0, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x52}, 0x0) 03:37:43 executing program 0: 03:37:43 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fdfdffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:43 executing program 0: 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x63}, 0x0) 03:37:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x0, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:43 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffdfd0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:43 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000007a0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x394}, 0x0) 03:37:43 executing program 0: 03:37:43 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000407ff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x0, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x7ffffff2}, 0x0) 03:37:43 executing program 0: 03:37:43 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000c9ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x7ffffff8}, 0x0) 03:37:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x0, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:43 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000810000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:43 executing program 0: 03:37:43 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000fff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:44 executing program 0: 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x7ffffff9}, 0x0) 03:37:44 executing program 0: 03:37:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x0, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:44 executing program 0: 03:37:44 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000003ffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:44 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000eeffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0xffffff1f}, 0x0) 03:37:44 executing program 0: 03:37:44 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000fff0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x0, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:44 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000bedaffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x2}, 0x0) 03:37:44 executing program 0: 03:37:44 executing program 0: [ 1560.452541][T23875] net_ratelimit: 30 callbacks suppressed [ 1560.452551][T23875] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x0, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x3}, 0x0) 03:37:44 executing program 0: [ 1560.592917][T23886] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1560.610637][T23886] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:44 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000f5ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x0, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:44 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fcfdffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4}, 0x0) 03:37:44 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:44 executing program 0: 03:37:44 executing program 0: [ 1560.970742][T23899] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 0: 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x0, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1561.036301][T23899] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000057290300000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:45 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fdfdffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x5}, 0x0) [ 1561.175679][T23912] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000f6ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x0, 0x0) 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x0, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6}, 0x0) 03:37:45 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000c9ffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1561.297339][T23925] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 0: accept(0xffffffffffffff9c, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000002c0)=""/136) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000f80)=""/197, 0xc5}], 0x1, 0x0, 0xffffffffffffff67, 0x7fffffff}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='loginuid\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 1561.364570][T23925] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x0, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7}, 0x0) 03:37:45 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000f8070400000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) [ 1561.501022][T23939] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1561.545751][T23939] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:45 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:45 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000eeffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x8}, 0x0) 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x0, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:37:45 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000f4ffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xa}, 0x0) 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x0, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:45 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000ff070400000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xe}, 0x0) 03:37:45 executing program 0: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000380)={0x0, @speck128, 0x0, "d6a811ab126d559d"}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) r0 = semget$private(0x0, 0x7, 0x2) semctl$IPC_INFO(r0, 0x0, 0x3, 0x0) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000580)=""/162) fgetxattr(0xffffffffffffffff, &(0x7f00000006c0)=@known='user.syz\x00', &(0x7f0000000700)=""/177, 0xb1) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000880)='syzkaller0\x00') socket$inet6(0xa, 0x80000, 0xffffffffffffff37) 03:37:45 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000f5ffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:46 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x0, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf}, 0x0) 03:37:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100032, 0x0) 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x10}, 0x0) 03:37:46 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000f6ffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x48}, 0x0) 03:37:46 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000080400000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x0, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x0, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4c}, 0x0) 03:37:46 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fbffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:46 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000408000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x60}, 0x0) 03:37:46 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = semget(0x1, 0x7, 0x43) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/81) accept4(r0, 0x0, 0x0, 0x0) 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x0, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x68}, 0x0) 03:37:46 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000040800000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6c}, 0x0) 03:37:46 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x74}, 0x0) 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x0, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7a}, 0x0) 03:37:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x4, 0xa, 0xf62, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000040)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 03:37:46 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf0}, 0x0) 03:37:47 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffffffff070000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x0, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x300}, 0x0) 03:37:47 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:47 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000007180)={{&(0x7f0000007040)=""/249, 0xf9}, &(0x7f0000007140), 0x32}, 0x20) r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) vmsplice(r0, &(0x7f0000003d40), 0x100000000000016c, 0x40000002) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000d80)={r4}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000240)=0x4, 0x4) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) bind$inet(r4, &(0x7f0000000d40)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x93) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) connect$inet(r2, &(0x7f0000000cc0)={0x2, 0x4e20, @local}, 0x10) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xffdd, 0x800) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000010c0)=0x19ff, 0x4) socket$inet(0x2, 0x0, 0x0) sendto$inet(r2, &(0x7f00000000c0)="b0", 0x1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000003b40)=[{{&(0x7f0000003280)=@sco, 0x80, &(0x7f0000003580), 0x0, &(0x7f00000035c0)=""/213, 0xd5}}, {{&(0x7f00000036c0)=@nl=@proc, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003740)=""/208, 0x66}, {&(0x7f0000003840)=""/125, 0x7d}, {&(0x7f00000038c0)=""/211, 0xd3}, {&(0x7f00000039c0)=""/209, 0xd1}], 0x4, &(0x7f0000003b00)=""/23, 0x17, 0x2}, 0x1ff}], 0x2, 0x2000, 0x0) 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x500}, 0x0) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x0, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x600}, 0x0) 03:37:47 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000004080000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:47 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="b9990000400f32b9800000c00f3235004000000f30b92a0a00000f320fc7aa00000000c4c2359cebb8eae500000f23d00f21f8351000000b0f23f836f30f01c82e2630971ca78a9c66baf80cb8c727058bef66bafc0cb02fee0f0b", 0x5b}], 0x1, 0x0, 0x0, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000040)=0x7) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x1, 0x0, 0x2080, {0x7000, 0x2000, 0x1}, [], "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", "7d8992d102e6827a07ba0bb5f83cf63eec062ed67d59bf7a20622f90005b84b86901f0d49cd886f26f2d9c6dcca948e84ebe4e75c3180291c29d8d3dea55a4792e9bfd61a83af4cb81392905a13372feffb0592b9751142eac30be407372faff5e355518c9b3652ae1331073355b1ec11c66f6deee69a6f5cdafc64863fcf4cbbb1e278cfaf4ead837237a8d06034ebefb0fb56a24d05c97561602573e53913b26cebf11d3b8e6e7876e5b932daae2bb93886781a28f83cb19bc8ea9a853315e49cc28bf39a3b625620a3622e6b461d7ddc55ab3b28a90b00420690e90e41c63f9a5c9c28e3919c6d47de59b28deb18c09d8f97ef83f02c090466c40ff15248a0609ccc571128a52f511f096f50a64d7d0b242dad800988e9c32a647f2d3c32d38303c69fc03de5f3ac8cb2e2ba43a3e76e2a3da814f8c05358f03dc53c6de6a9c1b2f01547a420aa8793239898aa15e0755d464a1ea450d246c4de02d4b86cad7c3a1b7f7a697c5410459c15c93791170d375cf0f717f20f0a22b4826f1b61c6b7577b9a6d485c857f17fdf95eec9036dd43b30fc2d36efe8b36444e5b3788595a0d19ed1ebd429b64cd69f1353ec8d2eaf056978c40906a76e657a924815e808e560fe50f4751f13bd9f0197ac053724d972829295fca82592363c3bb5b66c9671b1603e6d3f95de7689d387eeab4db42f51747112d41df5155e24037054247b8190fae280aa7faeb8bd191767e45e0aaa259c32ee3bb702771106a8cc468a473f3c5dbdc1e996a5adda54eb4d47cf47043f2328464e9fdf6e4a3f38634941c6efbfc640fd18b15df1338e8251dad059d661f40a28cd12aa64132d0d360b1ee79a26d64a24644cc83021461c238a73d005991f10b621b72871945a1de14be21261a811a89663ef4d8d0ff7f26fd904dab9ea3bd1a8664865e52f6a343a68f79f6b36e46af1f9b82811b8057758b17736efcb68efe5198159748d4a120d524ac383c8ce1cdeeeeb3ab7e19bd6b10a324effc44e68f7e942ced90602fd8c78c0564c656d767c6d34cb9f1f3c408a74b27b4bdbd5309a0595abe1cdc7271929d11c7341242c57f95c8c50a88bcfe52be7ade2033289654cc43b3d62666d49c62e2b32695e3fe9139ec23899f7ba09a4234fa1f2efe74d72edb70ebc6a3908b0407510c6cd5d410c231dc50a731deaf05219c06eb80643bea9f7ca3233a3a7dce0d9259bd306957bc2239afb0838720edcd02975ffd7e3b2017f6e78141adf51c2a40d6f9522ef155c7ff39fc0fe5720c2c5b63c2960359b997f506963bdd0d976200abb3eb614b20ec2981fb8f4d5986f4c73d0d7ceb0ff1e2476f1e651fe22883ad8a6c20f87ab5a85b336eadd8b1ec31e3853d7409cfedf8d6500088c8dcd76a7c6b86a23edbf41344eb89bf1c790e695927d629aad6b56e72fe305efb81009524ceaacc105c3bce18180e01b13a7578122ddb9e9355da1caf2cb3ad4e4cd34cd0de15427ff855f82da3ff9137381eb079eb5fbf33c923930f875d5ac70763a940101305d26e3516340e14458e5556470c68437df325f02387bea0ee3720e6bd4aabb5138b1c26d61b5e4499a8806e68bfec1cec1424c7e3a34a0a3d57ffc551b0d8732c0c07a57af59c3636161af99c6e33198db718ff5cac932d8234799e7b2857d7c2779e6f98bb3dfecb498a1334c82fec66783265d73d5c52def00f47f09734a1bfc33fcc84e46bc0d09db71f38ed4f7b779303ed3cb190d53cb286e3125c649fc6ea48c4b6c9d5cf3776691a72f91018a138936252764b8edd559bf2f51cc76e85394659467a0355b5da12f46f91db5d992da861d306ecb92ee6d5e6adb4af1fa98d8209859ac8da1ebdf161c33915b494b1141543988dd3c868b34d7376d0b2b7861705dd85035b55f2122f28670d732cb62bb8e323107095d82b772d8b1ebb18fd98eec52e106b9f40f59bc4ed8dc45b68575fdabc31b529261b63219f45c01b8d5e00fb6d42c5bad79a34bf70efd6e8032ae31666bc3fd6b12a124aa8db18ed9e895acbad53d50c2149ab3a8203d83c0e622dec3bde6829391787a58e855045be3464af86fdefe9ffddcc4a97f7321feae347c37c75ad7ed5b9d1500fe691aa78f8cbdc66bd90caaecea34e761efaa310a3e0b9cd5001ac351ddb2b1ebd0b79ec698f8bd461dadc26ec90ca221a4459853b2890a598786597f2a6a1e9fe0c4603d350bd06758a81e0c317ca22e22329696b7aefd59b51a2eb855bee3ecfc7f370b5376a3f224cf041671c96ab5cfa6d9e3b7588dbc56256d6f2a743f701d98378e1e9d10b312221c04da3994b56bd5e6ed7a59de1e1bdb9dc14327c9302c04443ce4f7d8eabd2ec5144cbed0cef0503d4a0e11072ca9d9cb24b4384df93f5a956384117148b01ce2c17612eb2ec491c139ebce27a4e320c3d1806f5d6371763482538493a807810b9a7703791ab71746a861817e9912b47d9c53f8d231b133e27806e4d5fb2abc389cf464f93296458c36845787f943fd5444d39cb964de16231803c9be7bc2b5b264852a34afb1383bc5230cce83730caeb6eed380ed3da078941b01d0c7669061ca73b93e16575af59f100124deba24d18d3e5642ec2a90d723e2234b5a4c2d81c060854fe4760f096e307ada5bdffa29c345c396e19d233b3e771ff9c217b3c69db52492f54aaf72bdac4f0cdb4600907b6fb58386af03ad0785d4066cbf07bab4de77b8257a771586911e80b52744baf9ec832bdcfa68b1aea7e6613de208faed163ba8242b0abd51f2b64379510d9e99344ec3d6e0546b4f253eaf2e5ed72f1d8dce4739a828fbaa80fe48affa9ae2c1cc90f8d51b6fec27b71755aaf4c02e21e84a07d0a0326690a96c5099f896cedac09ef1abc1702e21e23f2dc4490611eff77bbdf6e89efc46f6c786a5fe56462bdfdd128ab40d1b820f1c7bad8112098b7b9852f30f3b4fad1153c82a9e54ecffe074b7a830feea825cd76cfeeb6511bcc126b732975c9a152f7ef94c74107f5e731170209c15d5a166eec0f709a268f2cfe8e53a263576edc8827880497033f107d4c372b9abeda8c87db66484650dc1f712e4a5b8469965b5822ebb86eec00f73c164b5a4b28269fc3411a4842b5b2bc35638fa83d34c690735a3b8624f78256156acc5bc6299dcee0269569b6d1278d2c8042eabc741e6a9045ccb0afc99734456ff733eec65dfa258e806debfae2e7f9d5ee82659b9fa38bf44fe84bfe4e3593543462b3595eaa21bb400b5da5844ecaccdb63d82a919ef0ae410e40cd7915e54de2f6c1d2150ca8a6f8e2609f0bd2f58f8caa1fab67c038eb68e61ffaf5d844ec90426f2b45591e64ef3e7d6f0e064daa64deebc356edae3d1b0fc3fa9e4597b8b9548ba749edeeefabb0127750488a7c12258d7daf9ae35713403b85956c64fd622db9fca92ef9849de11ab3ba6aa46ea1acdaf4afea9ed5b718955f24b173afe0f358f6a7b8901dd7be908af2094c3a6dac5ad20b3e3d68ff19eadefa1ee5937d61dbe12c48800f8bb6b28ed2e49f34bf7752f20452bfaddaf562ce8822d554fb43159cec6baaf701bd3c4b078eafd7b79eb5372f6fe220d104a98b89ab2ab795851d80861e19afc26077eadfb1e02596e51e88787a1e694050e53748c93b082ad0ba8d2cf579e3942e8142a6560a58e875868c7a24f1339692808cbbc4e272e143a8d216d945839aa4f8f2197a78b1f69368d825ec1e27f4689b5b0b17f568568bd1cde17ae07a81ab60e2ea0601671733445016b656593f911485255e19b3175307359ea1629e2f3470d44d5ee1943e55e2a4cdbe5b7c3e733fdaa1b1b61ef1b19b731a7d515ec47d79a11b471cf6c966bcfa499fa824d528c6866223205e342f09b4e87a1a4ce999307a0be89d4945e0b94acda460081412b9f1af5020d6605a362d7e9c3e25f621463eee09411fa07fbcbbf8449e86bf70a93d4243a4eb2202b6ebd6f2a0fc7923ba5c47bf0eba5fd2c9d410f9685525e7680a30e51cbc715d1ebc4758a0a3c307321cc465598de2e744c8e7bd4b36a433e81876ebb5f19cc73bd4769fa38191729d6374b59ac10556df388592dd857bd6a34727accead24a9fcc77257976e23521e1fa9d5d4c0dc2ea6736cd2293188d278e9f8df43f46de905695cbf5d5f3ba02010682aed966d36fe6ef5c78ccb843f3f66ac823b81d69d7127fdec133aaaabe23de0ef5c2afddd74e260c8ba6c5e887807f6a2ffc65b450e06d8387f53e4f79016cefcaf3283b1acb94fdbc13d8d152ed5d660e60f66ffdd6279b738fdf92ec6746c43bed2834b4ee6080d61e53e9b707af061a932130976547488626645400bab469e7e02977cd4c21a046ba00663f2a46b3d528c1c3bc3e61ca108f40be8763aeec029dc23d44f131f07068ba925d5ba3f99ca44c10884313492a44cf3d07eff9716b37d90420e6b3468c084863b0e171e9f6d305612d76556af429ff5f3b172f917c255924322654180c0e7bf089956d8e4de0fa186abc368e6c5bd500a152f3003383c69e4657f8e4df2e3e1cc2cebe54aadceea061915483b5b17707d3148d1153422154f75a7041c0417a34606fd55d657b2a6cfab566d51333c17cf6b621e081a1709afa524bd3e91aee5097cc574e8afb6858af73b5ab279e071fdf96c24c805145549949b10c533777128f978361262a0841ebe6953696c2662b84c8bb21d586298c003cfe42cad379f0bc66dde66eca231a121cd3c3451453946ddfe9d0876986cc586919a7ca91d06c5da158b1f969a2659f1bdaf4d2d0cacff64b3b370b96ac47db47c85d32963cdad1dc1333c01e570573dd55de56539b8309745d62d49cd031fe6e86ecef468875dfde26815c443a2a0ff69cde23483fee1155dcc2262c0f6e64f9370a41d69f148128c0af604c4f3a5c8ec1f31cf84668f3fa191701ba325b94e9eb815c0d6fe13b458f59fc268cc1206f80eab7a3779c165a0c33aa723d14d3308389682bc0e90a9643161fc78001f08f1e40a8ddd4f1529d4f0528f1ced83f9ed02e77dfe2fa154a5ee5049ebb1d6618287340fee235366ea67923d508df8f11f221dc5cabedab0333eb1e3b3b7a6c6dbf86370922f3f22956a7da96063de5a7198fd71de6a581ca46f7307dd884a27f058c37aa24bdd3a366939e219d5653009cb11326ba81d6a65156ca2dc743ad22904e8496ea3c948545fa14ea962551957d9b9857badaae5027338b965f8c6f6038977b30040fd88dcb281e1f827f1c40e70d46dedb9c4ab54f7867733c98b27842624f1114a7047b9a2be739516f210fd54dfc645cf64964e310ea061c5fd2e954dfab5b6caaf96bd70c7e554abfe774888cf93394003284e95a14a48aa8d00abeefe43e2b623bfe967699e665c759e874fd6fe7f997bf10f2f9e216913069932286e0eee7b50fa35cb22826f2b278d75ae9b5bb3242a40ccb0bf44d420295f6e705559ed8a1a3cde4b48d8ed535ccb741a8a12659babf4977e1a342efb5b09b53402ede3dc53c4317c74976d171ce548b58c4afbcb35456058dbea663883ce936337479513e4a92c826dcf4b9c77fab655a21fd86a7a3716cb3c53704a9412458c3b0eceb27ba9721ae9c1263b7f5880803284b9c61b1303fc592c085219bf735b9de10add2e786ec5b0f13bb18e07ad574f88cebe58317ae5a4a3f3ec44c77ed2ba197e8656aa7c7b8acbb371ace58d5432533d04b891fec3351b98059b68453abd43822a6550e4710862413efa2081500c68452ad8afbadf6c2e8"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x2, 0x40f, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x700}, 0x0) 03:37:47 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:47 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000008100000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x0, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xa00}, 0x0) 03:37:47 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:47 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000810000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xe00}, 0x0) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x0, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf00}, 0x0) 03:37:47 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="b9990000400f32b9800000c00f3235004000000f30b92a0a00000f320fc7aa00000000c4c2359cebb8eae500000f23d00f21f8351000000b0f23f836f30f01c82e2630971ca78a9c66baf80cb8c727058bef66bafc0cb02fee0f0b", 0x5b}], 0x1, 0x0, 0x0, 0x0) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000040)=0x7) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x1, 0x0, 0x2080, {0x7000, 0x2000, 0x1}, [], "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", "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"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x2, 0x40f, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:37:48 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:48 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0x0, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x2000}, 0x0) 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x2750}, 0x0) 03:37:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0x0, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x3f00}, 0x0) 03:37:48 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x2, 0x1, 0x0, 0x0, 0x100000000000, 0x81, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6a1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3fffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) fstat(r0, &(0x7f0000001b80)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) r3 = getpgid(0x0) shmctl$IPC_SET(r2, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x4, 0x2000) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x4000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0x0, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x0, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x0, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) r5 = syz_open_procfs(r3, &(0x7f0000000040)='net/dev_snmp6\x00') lsetxattr$security_smack_transmute(&(0x7f0000000280)='./file1\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) add_key(&(0x7f00000008c0)='dns_resolver\x00', 0x0, &(0x7f0000000ac0), 0x0, 0xfffffffffffffff9) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) r6 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r6) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0, 0xffffffffffffffda}], 0x100000000000012f, r7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) sendmsg$alg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000680)="5d78c3e1cd5d7deae1d4e8ae39e768d17f0dd7bc490831b663a284c27708a9b907c7e8f66c4c524158b70c10e4df7d878ae989ffed06c477a4c91ce9813460b168c00aca26320b75374d3bde76e8d2c3befeb0c247dbbc883a802585a49be30d1e5cceb109c8d8c8fde7645ac253d9ef6a005dc60aa583844ab853c2576b1dc231d7dc16415fb9ab419ed614a0", 0x8d}, {&(0x7f0000000740)="918a6df2d77cd7fa4989a5b5b28dc3726e822c2dd7407764b1c33e30830a189c108bf5d9191adaccd7f4d493cf5670aa3782bbf347ff97c13fdb9d403d5963f1fdc0ae6ed78071d36fd8a4b9bf56096fdeb71640192d", 0x56}, {&(0x7f0000000140)="ea429de4b15bf3aa4b83e87b06fc342e7c2b53db555af467c68198149691782ef77d3c35f1cee8e00a02bf8fc41f660ca3", 0x31}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f00000007c0)="a9201262086b019ba2700a30b70d0d4453e9dd333c53da4a6453810e8eae61da30c281a4f5d2aa060c6172a265c276fa028874cd6b8cee4944044635070f81f21fe53c8025e9156943bdbf48fdf60c7ce24c4e3b91bb1a37327148d1a88f9c435d267ed93be7fe832e003ade268e06a3e869924a617d82197fb42ad9323689c5fec965a31158c3450bf013bd984d3b90f90abae9d7ba88d4da50e2273133cc8c9239f2aee68908", 0xa7}, {&(0x7f00000009c0)="881507bbc857d241d250936a0eca776f36635b6745c103190f31bd45bebcaad3c1e177fa2b8db48a923a6858e5b12b094b2e996752d9813342bcc621848241643e13d5d4b8d8ecbaddece7c52a1518014669997ee592a8dfe0de43ae2efcbcb3d946dfa55e3b7c3212d4df0cebe4a819ad2365dc8566de54cc84564ca4831a77f406b6bdf0c20e77348ef34588d1c42fc83ce9dfa8a5e059e3d9a42aea237b9d0c45c29f98ae0e8065f0bc291dcb29d657d33b4e1799af0c9a0a357c742604092bea877ff861ea52f77b16b6b3c1f3fbef4c8369b542a4fedf02b32d4b0296ef99104709c901587a0680d279adfb032f19", 0xf1}, {&(0x7f0000000ac0)="6ceb1a363ce88882a3c720351ea851a9280ebe79080e75246e845067fce59fbcd68fa9c69cce6845a16d22044925d9501db0a5a216b2f491ae735ac3d67944c54b1a9054abe7c6e1fc17eef753a999960f49f632f4e095635e0519677b8cabca691278d1813ecc088c37724724f5da708f7bcf6d7d80ae0637537c07f562678c4cd858b0efb8b77903", 0x89}, {&(0x7f0000000c40)="45b5268f64aa6430a5fbfa6e9f53a4edd68a37b2af97770dbf6981d75342e1843554b2d5203296af59fdcc1afcb52cf2f0ed18ea4642cf21e26e5cbec5bf3c33070fe048936b828d3fd65e10c6d9798518ba99e85928236b", 0x58}, {&(0x7f0000000cc0)="c1bdbf23659d550ef964b8ca19cb4b8fa2769006dd24a020c8fbe8e794fb2c69e7e2f1b9c27817c6bd054e376972cea4a2bad6396906c637edec85343c5244f674a79c848a462374a65fbff83b11", 0x4e}], 0x9, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x88, 0x44001}, 0x4000011) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)="6444f079d0fa18464acb74ea515ab42fe196926df2018f512b75960636fa153fad4c096f0518c4dde72f17d82138a848df9892837838dcb788d656683b70c8590be3c9806bc812c245e0649059ca1386825b7296b691da524e0b48a77b07ef51742a43a8d955480b52d3389c9a9d919989b0d46d5ba487ae83c3bcc567e56b6511da2b572825279430135842d12b68d8f551ac995175e913f9cf73440e", 0x9d, r5}, 0x68) 03:37:48 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:48 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4800}, 0x0) 03:37:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0x0, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:48 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4c00}, 0x0) 03:37:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 03:37:48 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x5027}, 0x0) 03:37:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x180, 0x0) r2 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000009c0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee00, 0x0, 0xee01]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, r0, 0x0, 0x21, &(0x7f0000000a00)='cgroup]:ppp1mime_type&}[security\x00', 0xffffffffffffffff}, 0x30) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) r11 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000b80)=0x0, &(0x7f0000000bc0), &(0x7f0000000c00)) r13 = getgid() r14 = getpid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0, 0x0}, &(0x7f0000000d40)=0xc) sendmsg$unix(r1, &(0x7f0000000e80)={&(0x7f0000000180)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000000c0)="76fcf949da429aa7d1b810f24244f71fed75a0587242cf1a062bb869590035", 0x1f}, {&(0x7f0000000380)="f1e2b31d8822cd67a227f4d2345b7ded810c4c0292adf40084a96c9e619504f0fe82a1daee30d869bf1b4f3f124cb05d1a8aa91e6ecfeecaa675a85bef16fbc29eddfb0713ee6476b96b6a42e66c29e8e6974be17ad39c4ba32d448b266d7eac89eed2f593907300efe41aea45ab648699cf4548f9adf02150be7bacc5b6b6219a03564e8fe83ca183c08a075ee879e871f4a715d6cabea966c576d1a9ccc53375e0b2675ebbab4967ade7144efebcf66435eeb98fd1688cf4a30f1bd0d357b40cc4", 0xc2}, {&(0x7f0000000240)="07f026aef15d9bf3f312ecc31efcad830857baa12b98f71ded93b3f64a7028210c362a188920da973a0bdbaa6b0929542fcbd44cf143b0d0c698771f08f9ca3bba4dddbd3a5844a3bcfd9d6136f56110f997472d945507f51c9b36648b7599874a037cb490707d3415fbe247b3dd734d", 0x70}, {&(0x7f0000000580)="327dfbb493a093e0acf162d5d7d8cb9700410d1c32b9a425aaa39ad245d819fb64af7b259f0bf14d4d542ecb6c937554ff7e16c2c95966b117fa6a33295996b816c5f1a063b5d969fa7bebd0404facc94522676e34e1f5d52465054667194387ea78c97ad5e3b9f4ba482853a66a963289836a7488d6ff6fe11f35c03810f5b8fc81d40e9d6f74e9b8c44ec04012a1e410feec438a7d4a20b61031450936b7ac0a0da4c6b8bc337300f9558ca5bfaa3b0934ebf660be48730374bed3c2cf48b43c4e503f7a14365cebbd0d6e7461328d2b85c06aa99348c099417f598cb67cd3f731407c84f8175387972b600dcf830977", 0xf1}, {&(0x7f0000000480)="0831ed2231abb7c05469c01fc2a5d03f9daa11f42c22f6771b1f4e8be475c1f3d3801533391e3332f0de038401594243e5187c96085ec123f41340bc225981af801df9725a9a56c0796194f9fe6c1c7857ce496534b9d4586401c355d4650403ec1413f3f3a49959a02e19533eed7d578530a3", 0x73}, {&(0x7f0000000300)="6d1834cb90fcf254baafe6fecb9f8b052aa32643b63a60ce0f91e20683895e", 0x1f}], 0x6, &(0x7f0000000d80)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0xe8, 0x4c040}, 0x40085) r17 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r17, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r18 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r18) open(&(0x7f0000000340)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:37:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x0, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6000}, 0x0) 03:37:48 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:48 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x20000000000002a) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef00130cc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b16", 0x2a) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000001c0)={{0x8, 0x5, 0x0, 0x200, 'syz0\x00', 0x4}, 0x6, 0x8, 0x81, r2, 0x9, 0x9, 'syz1\x00', &(0x7f0000000180)=['.\x00', '/dev/sg#\x00', '/dev/sg#\x00', '.\x00', '/dev/sg#\x00', '\x0e\x00', '/dev/sg#\x00', '/dev/sg#\x00', 'cgroup\x00'], 0x3a, [], [0x800, 0x4, 0x800, 0x5]}) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000440)) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000300)={@remote}, &(0x7f0000000340)=0x14) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)={0x5, 0x6, 0x2, 0x6, 0x2, [{0x2, 0x5, 0x8b5, 0x0, 0x0, 0x2000}, {0x0, 0x8c, 0x6, 0x0, 0x0, 0x1100}]}) 03:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6800}, 0x0) 03:37:49 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:49 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x0, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6c00}, 0x0) 03:37:49 executing program 0: r0 = socket(0x40000000015, 0x40000000000005, 0x0) setsockopt(r0, 0x100000114, 0x1d, &(0x7f0000c63ffc)="66014ebe", 0x4) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f0000727ffc)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{0x27a, 0x80000000, 0x8}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="4dad1dfb77b44ba6b44a794af9ca959622d6efe8a834aeec5357214b40e53d398cad92a3e3e3875e9422fe6e7caf6d396791617f113685c9e2b74188916a6dbf176de6", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000e40)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000ec0)={0x3c, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\x00', 0x8, 0xfffffffffffffffd, 0x39}, 0x100000146) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) lstat(&(0x7f0000000e00)='./file0/file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x0, &(0x7f0000000380), 0x80000, &(0x7f0000001140)={[{@uid={'uid', 0x3d, r4}}, {@gid={'gid', 0x3d, r5}}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000d00)={'ip6gre0\x00', 0x20040000009}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(&(0x7f0000000e80)=ANY=[@ANYBLOB="38d6235488bb0fb34f52ffa1089aff3a2dda6d16dcf00100000000000000016b7b1039cf593e44000000808131d1"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000001180)=ANY=[@ANYBLOB="434e4436a8264a4ba97d8e60cc9b5194acf30bb7ad140bef77d22b26a2371d31e66b3384fe63ca3075eba5271db1127b7b4a90e31041359c86a1bc1733e5592906b3ec0c26b7370706b400dabe5ce818ac2320cacb29fdb3c9a59e5cce91134000d823df1592d507c0236392560cb692f782661882ecffffffffffffff1df091d6c85e84b6c99e4866629e34470503c1c4a2f48a99"], 0x0, 0x0, 0x80010, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000010c0)=ANY=[@ANYBLOB="f34e277bacb3602a0aa85d64c8e736d38171b89702fb50978a68b4d377fdb9c9d5b08e5ecf4cf8b1fc1ffaba8406a46c17438e482749361e32b764e1ae5a000000000000000000000000"], 0x0, 0x0, 0x5010, 0x0) preadv(r3, &(0x7f0000000040), 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {0x77359400}}) close(r2) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7400}, 0x0) [ 1565.182410][T25390] input: syz1 as /devices/virtual/input/input610 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x0, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7a00}, 0x0) 03:37:49 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:49 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf000}, 0x0) 03:37:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)={0x7, {{0xa, 0x4e23, 0x5, @loopback, 0xfffffffffffff000}}, 0x1, 0x3, [{{0xa, 0x4e22, 0x3, @rand_addr="6d3074b026651253e36b21816df5497e", 0x1}}, {{0xa, 0x4e22, 0x10001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}, 0x5}}, {{0xa, 0x4e21, 0x900000, @loopback, 0x7}}]}, 0x210) bind$llc(r0, &(0x7f0000000380)={0x1a, 0x336, 0xb0, 0x72c1, 0x9, 0x2, @broadcast}, 0x10) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000440)=0x4, 0x4) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x13) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 03:37:49 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x0, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:49 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1565.510502][T25511] net_ratelimit: 56 callbacks suppressed [ 1565.510511][T25511] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1565.540718][T25509] input: syz0 as /devices/virtual/input/input611 [ 1565.552685][T25511] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x34000}, 0x0) [ 1565.684759][T25621] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:49 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x0, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:49 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x400300}, 0x0) 03:37:49 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1565.905542][T25631] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x0, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf0ffff}, 0x0) 03:37:50 executing program 0: r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x2, "7ab3"}, &(0x7f0000000140)=0x26) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000180)={@loopback, @multicast1, @empty}, &(0x7f00000001c0)=0xc) [ 1565.947063][T25631] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:50 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) [ 1566.013021][T25639] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1566.051270][T25639] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x1000000}, 0x0) 03:37:50 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x0, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:50 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:50 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) sched_rr_get_interval(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0xffffffffffffffaa) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x5000000) [ 1566.222618][T25751] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1566.233610][T25751] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:50 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x2000000}, 0x0) 03:37:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x0, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1566.429735][T25767] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:50 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x3000000}, 0x0) 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4000000}, 0x0) 03:37:50 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:50 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x5000000}, 0x0) 03:37:50 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:50 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:51 executing program 0: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) sched_rr_get_interval(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0xffffffffffffffaa) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x5000000) 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6000000}, 0x0) 03:37:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x0, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:51 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:51 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000002300000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:51 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000041a9e50b000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7000000}, 0x0) 03:37:51 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000003f00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:51 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000001f0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x0, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x8000000}, 0x0) 03:37:51 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10082, 0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x808000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0xa8, r2, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xab80}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x800}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8e9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x101}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) sysfs$3(0x3) 03:37:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xa000000}, 0x0) 03:37:51 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x0, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:51 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:52 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000001f000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xe000000}, 0x0) 03:37:52 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000be5a94100000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x0, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:52 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000100)=""/213) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) shmctl$IPC_INFO(0x0, 0x3, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) keyctl$join(0x1, &(0x7f0000000240)={'syz'}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf000000}, 0x0) 03:37:52 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x10000000}, 0x0) 03:37:52 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x40) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 03:37:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x0, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x20000000}, 0x0) 03:37:52 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:52 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) fcntl$setstatus(r1, 0x4, 0x102800) dup3(r1, r0, 0x0) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x3f000000}, 0x0) 03:37:52 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000f250000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x48000000}, 0x0) 03:37:52 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000004b53445200000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x0, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="9500000000000000bd000000000000009500000000000000e3a435ff6996051bab28a7758098ffadd7793693a337bc40ae2b1bac6427d9e2bd741b78c26939574a53d233f98ffda16724d3614adbddeeffcf9ca7e41067b18f30180642e5fc4b95faa01dac9ad45c1278fc832ca8abf3bcdefd7aa3d70d325fcd915e84ef4cff1ddeaf6738bd45e690dbb6ba83dd6dc53ef1199f622975932e"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 03:37:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="b6222797a22e8328e14f9d3acbe7f20628af085d204c42415f435c11c1bef33b8c304e39d9176ac8d4d4f8bfe5a2da7bb2fa974e3e003835c7974621a49c391bc9720f44715986be90d6aa4727227f35473e404a7ae0d8f34137443460f17339d6fb5c856157d8ddb6a9f84becdfc203f8f6b6596bc2245b3c78b07ca63528620b823129fcbe11e113a183726db798c63f17f24c64ebe10a479eb7c8c00cf678ae622e5277dd0fa5d6ba4bf61aa8140309ce097acec2c9d80b7d9009c6276d4b509ec62a8929970bcaa397c2fefaad6e8aaa2c50", 0xd4, 0x1f}], 0x1000, &(0x7f00000001c0)={[{@pquota='pquota'}, {@allocsize={'allocsize', 0x3d, [0x0, 0x7f, 0x0]}}, {@prjquota='prjquota'}], [{@uid_gt={'uid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type='appraise_type=imasig'}]}) ioprio_get$uid(0x3, r1) 03:37:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4c000000}, 0x0) 03:37:52 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000023000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x0, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x50270000}, 0x0) 03:37:53 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:53 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000455200000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x9}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)=0x7) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000002c0)="711fffd29b7d1a4c64f5bb55737e14d0ea489c720b7031cf711baebf0659cd4da90c17eae9ff0f5b4dda5c23ac3f9a8318c37fbae54456251f2c7826fa848883e96342d76eb0ac7d417cf99fcb431874f81347c388d76f8501363af9ba3b5b9aa6579077c3357c9d093624d30a91b7bed8896797b210cdfd8d70021cf57abdbe74befdcc3e5297b05f28d2b8b7447269cb0bcab6ba41297d7583a203da9099e25ef4fc7728b5fc", 0xa7, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000740)={r4, 0x1, 0x9}, &(0x7f0000000380)={'enc=', 'pkcs1', ' hash=', {'sha384\x00'}}, &(0x7f0000000400)="fd2aafa153880a8bdb8be9829235", &(0x7f0000000440)="3dc46552a20efe8637004a0c0ae981856fb38dfd3a4e7e5cf017080e3b2f57e410891b9d3b110728e8c58aea44ced9fc2016c06151d8ede9b9902f2369369796a46d823fc05dff0bd045b1938599578f8e4787e02ebaf6f9c9000879b842d13e3ca00c8df487f8c3dc4046a0813b4d96e51596df9e25d792c2faff1e6b1857e8fd7d7e3943ce04fccaec242dbd222ec82d4f9aa6220f05d56aeb110873a4f192807b728cf2bb7b59cd7d1b55d2f631c983401aec2b0044a757e78849838bab30f9848bc7ee8cbf95175e144068eefa250394112ff695f44ec60ccc1437819db0491b430eaede503651a4baacf269c55f087d463d78768e61") r5 = add_key(&(0x7f0000000680)='id_resolver\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="58de6ce5e688", 0x6, 0xfffffffffffffffc) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)="935ad20c1265f08e406767b3836f89f3148baf00c16739875e89d02de69d54d21bd8e8510e108ca72ad6d1e301da42918d601725451bd43249ad59fe67c3b7d0a9ca7c9af7bd80f4420ce6424a16d5ba9c9ea51a8f8b623453f965ea332f07822bb13a016be9aa4c32aad17efd49da2d5d0a6a7453bb8a20d726f82e94b51c1692ededa450132842126fa5ee9d391669821617501ae91396acdcfe39e343941b7606395c2cb733ab4b5f", 0xaa, r5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() setsockopt$inet6_buf(r3, 0x29, 0x43, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x5, 0x8, 0x200, 0xdcb0, 0x9}) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) fcntl$setstatus(r0, 0x4, 0x42806) 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x60000000}, 0x0) 03:37:53 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000f25000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x0, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x68000000}, 0x0) 03:37:53 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000003295700000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:53 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6c000000}, 0x0) 03:37:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x0, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x74000000}, 0x0) 03:37:53 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7a000000}, 0x0) 03:37:53 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0105303, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x40000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x200080, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x8000, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty, 0x2000000000}, 0x1c) r6 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) listen(r5, 0x200000000002) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x428102, 0x0) r7 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r7, &(0x7f0000000640)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000500)={r8, @in={{0x2, 0x4e24, @rand_addr=0x9}}, [0x8, 0x4, 0x6, 0x6, 0xcd, 0x800, 0x0, 0x0, 0x100000001, 0x7fff, 0x1, 0x5, 0xc12, 0x20]}, &(0x7f0000000600)=0x100) ioctl$TCSETSW(r6, 0x5403, &(0x7f0000000440)={0x7, 0x1, 0x3ff, 0x8, 0x10, 0x3, 0x100000000, 0x6, 0xe6a, 0x9, 0x1, 0x1f}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x3}, &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) dup(r1) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000006c0)) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='proc}%\x00', 0x7) 03:37:53 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000008256455700000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x0, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:53 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000be5a9410000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x9effffff}, 0x0) 03:37:53 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffffffffff7f00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf0ffffff}, 0x0) 03:37:54 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x0, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:54 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xfffff000}, 0x0) 03:37:54 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000420000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:54 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0105303, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x40000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x200080, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x8000, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty, 0x2000000000}, 0x1c) r6 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) listen(r5, 0x200000000002) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x428102, 0x0) r7 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r7, &(0x7f0000000640)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000500)={r8, @in={{0x2, 0x4e24, @rand_addr=0x9}}, [0x8, 0x4, 0x6, 0x6, 0xcd, 0x800, 0x0, 0x0, 0x100000001, 0x7fff, 0x1, 0x5, 0xc12, 0x20]}, &(0x7f0000000600)=0x100) ioctl$TCSETSW(r6, 0x5403, &(0x7f0000000440)={0x7, 0x1, 0x3ff, 0x8, 0x10, 0x3, 0x100000000, 0x6, 0xe6a, 0x9, 0x1, 0x1f}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x3}, &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) dup(r1) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000006c0)) setsockopt$RXRPC_SECURITY_KEYRING(r6, 0x110, 0x2, &(0x7f0000000080)='proc}%\x00', 0x7) 03:37:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x0, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xffffff7f}, 0x0) 03:37:54 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000ffffdabe00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:54 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000be5a941000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) [ 1570.562449][T26798] net_ratelimit: 42 callbacks suppressed [ 1570.562459][T26798] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1570.631682][T26798] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xffffff9e}, 0x0) 03:37:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x0, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1570.803509][T26908] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1570.840179][T26908] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:54 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000ffffffc900000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:54 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000480000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xfffffff0}, 0x0) 03:37:55 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000042000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) [ 1571.111414][T26916] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x40030000000000}, 0x0) 03:37:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x1, 0x80000000}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r1, 0x4) r2 = socket$inet(0x2, 0x40000007, 0x400040008b) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x3ff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r6 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000140)={0x101, 0x0, 0x4, 0x10000, {r4, r5/1000+30000}, {0x3, 0x0, 0x4, 0x54f, 0x9d, 0x3, "7343b949"}, 0x5, 0x4, @fd=r6, 0x4}) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x23, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_mtu=0xffffffffffffffff}}) 03:37:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x0, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:55 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000ffffffee00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) [ 1571.227971][T26924] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1571.256078][T26924] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:55 executing program 0: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c6518ca3f23734cf4302c6c6f7765726469723d6b6469723d2e2f66696c9c62e465314378a983fd9c72cd199283ad37b6b1bd0ec3c55c67c25db467d0e88dd81faf347c8f881db7cf5480a840c3bc537e70b4561b806e81004380e6028ff79731b281d0e8b78086b76d31217a7222c8147366127771b55b3f4b9923df"]) chdir(&(0x7f00000003c0)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB='\x00'], 0x1) fsetxattr$security_capability(r0, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2, 0x14, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x5d) [ 1571.374958][T27037] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1571.391703][T27037] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x100000000000000}, 0x0) [ 1571.422492][T27038] overlayfs: missing 'workdir' 03:37:55 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000004c0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x0, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x200000000000000}, 0x0) [ 1571.512875][T27043] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:55 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffff400000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:55 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000048000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000000), 0x0, 0x9) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x15, 0x8, 0x3, 0x4, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x4d2}]}, 0x20}}, 0x10) 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x300000000000000}, 0x0) 03:37:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x0, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:55 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffff500000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x400000000000000}, 0x0) 03:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x500000000000000}, 0x0) 03:37:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) accept4$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14, 0x80000) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="1649d97e328a9ecb3cda02c3d16f28aa47e500afa9ac181bbabe10a65a1b562eaf4dca404a1a5abd811b5b7ba687cb9354488e74d4adb154a3eb1f25428fa57497", 0x41, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:', r3}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x9) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000500)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000240)=0x7005) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x1000}}, 0x20) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) clock_getres(0x3, &(0x7f0000000400)) write$sndseq(r4, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x30) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) 03:37:56 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000004b5344520000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x600000000000000}, 0x0) 03:37:56 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000005244534b000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x0, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:56 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffff600000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x10240, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={{r3, r4/1000+30000}}) chown(&(0x7f0000000340)='./file1\x00', r2, 0x0) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x700000000000000}, 0x0) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x800000000000000}, 0x0) 03:37:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x0, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:56 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000000407f800000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:56 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000380)=""/189, 0xbd}], 0x1) close(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) tkill(r0, 0x1000000000016) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xfe, "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"}, &(0x7f0000000180)=0x106) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000001c0)={r3, 0x1a, "f6f40213f8eee4e61363df5ff4b39a0038486e2a576356e7bf8b"}, &(0x7f0000000200)=0x22) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xa00000000000000}, 0x0) 03:37:56 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000045520000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:56 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000004c000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:56 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffffb00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x0, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:56 executing program 0: pipe2(&(0x7f0000000800)={0xffffffffffffffff}, 0x800) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000840)={{0xa, 0x4e22, 0x200, @dev={0xfe, 0x80, [], 0x15}, 0x89a}, {0xa, 0x4e22, 0xdde, @local, 0xfff}, 0xfba, [0x4105, 0x3, 0x0, 0x7, 0x100000001, 0x2, 0x0, 0x9]}, 0x5c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x759a}], 0x30}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0x8000a0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x7ffff000}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3, 0x0, 0xffffff16}}], 0x26000, 0x0, &(0x7f0000008bc0)) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xe00000000000000}, 0x0) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf00000000000000}, 0x0) 03:37:56 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000004b534452000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:56 executing program 0: r0 = socket$inet(0x2, 0x850000000003, 0x400000002) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x8, 0x7, 0x401}) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet_int(r0, 0x0, 0x4000000000005, 0x0, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000140)) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000100)={0x1, 0x0, 0x100, 0x7, {0x1, 0x6, 0x86b6, 0x8001}}) 03:37:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:56 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffdfc00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:56 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000329570000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x1000000000000000}, 0x0) 03:37:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x7, &(0x7f0000000140)={0x0, 0x34, 0x5, @tid=r1}, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) r5 = dup(0xffffffffffffffff) pipe2$9p(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) timer_create(0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xffffff89) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) recvmmsg(r5, &(0x7f0000009f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}}], 0x1, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fsetxattr$security_smack_transmute(r2, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, 0x0) ftruncate(r6, 0x80003) sendfile(r3, r6, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r4, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) 03:37:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x2000000000000000}, 0x0) 03:37:57 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000fffffdfd00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:57 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000004552000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:57 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000000407ff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:57 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000825645570000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x3f00000000000000}, 0x0) 03:37:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4800000000000000}, 0x0) 03:37:57 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000000000000fff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0xfffffffffffffffd, {{0x2, 0x4e20, @empty}}}, 0x88) r1 = dup3(r0, r0, 0x80000) mq_getsetattr(r1, &(0x7f0000000200)={0xec6, 0x0, 0x3, 0x7f, 0xa, 0x2000000006, 0x2, 0x2}, &(0x7f0000000100)) bind$inet(r0, &(0x7f0000000300)={0x2, 0x0, @broadcast}, 0x10) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000140)=0x122) 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x4c00000000000000}, 0x0) 03:37:57 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000032957000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x0, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:57 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000003ffff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x5027000000000000}, 0x0) 03:37:57 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000680000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:57 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x101000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) read$rfkill(r0, 0x0, 0x0) 03:37:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6000000000000000}, 0x0) 03:37:57 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x0, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:58 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000082564557000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6800000000000000}, 0x0) 03:37:58 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x2, 0x599b310f, 0x3, 0x4, 0x48}) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000140)=r0, 0x1e3) 03:37:58 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000007ffffffffffff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:58 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x6c00000000000000}, 0x0) 03:37:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x0, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7400000000000000}, 0x0) 03:37:58 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000007fffffffffffffff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:58 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000005b000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0xffffffffffffcf01, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000000}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000211, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x7f) setns(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x60, 0x4, 0x101, "9e63253687a41769adf21d4be83bc904", "0af6fbc5862512c432596ecead37b0c8227d666736511794ef8de2de9bb5bab2dbb92de6ed62a54bf2e823d8f13967a1767b83baeb98ec876694f6b1b642e9997c28aa50787783a37dad9b"}, 0x60, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 03:37:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x7a00000000000000}, 0x0) 03:37:58 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000740000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:58 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffffffffffff00000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:58 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) clock_gettime(0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, 0x0) recvfrom$rxrpc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:37:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x9effffff00000000}, 0x0) 03:37:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:58 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000068000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:59 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xf0ffffff00000000}, 0x0) 03:37:59 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000364256780000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:59 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000006c000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:59 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x0, 0x800000000d, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) 03:37:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:59 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xffffff7f00000000}, 0x0) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xffffffff00000000}, 0x0) 03:37:59 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x101000) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @bcast, @remote, @rose, @remote, @rose, @null, @netrom]}, &(0x7f00000000c0)=0x48) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgid(0x0) waitid(0x0, r1, &(0x7f0000000100), 0x1, &(0x7f0000000180)) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1812) write$binfmt_misc(r0, &(0x7f00000005c0)={'syz1', "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"}, 0x1004) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000002c0)) execve(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000500)=[&(0x7f0000000340)='\x00', &(0x7f0000000380)='em0\x00', &(0x7f00000003c0)='hfs\x00', &(0x7f0000000400)=',eth1&[[\'\x00', &(0x7f0000000440)=':[{keyring\x00', &(0x7f0000000480)='security\xcf%trusted%vmnet1GPL', &(0x7f00000004c0)='\'wlan1\x00'], &(0x7f0000000580)=[&(0x7f0000000540)='/dev/adsp#\x00']) 03:37:59 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000000007a0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:37:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={0x0, 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:37:59 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1575.592821][T28707] net_ratelimit: 47 callbacks suppressed [ 1575.592830][T28707] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:59 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x80247009, &(0x7f00000001c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 1575.663343][T28707] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:59 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000074000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0xfffffffffffff000}, 0x0) 03:37:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={0x0, 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1575.842755][T28806] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1575.862921][T28806] openvswitch: netlink: Key type 4097 is out of range max 29 03:37:59 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 03:37:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x2}, 0x0) 03:37:59 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:00 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x3}, 0x0) 03:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={0x0, 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:00 executing program 0: capset(&(0x7f0000a31000)={0x39980732}, &(0x7f00009b3000)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) mlockall(0x1) 03:38:00 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:00 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000007a000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4}, 0x0) 03:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x5}, 0x0) 03:38:00 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6}, 0x0) 03:38:00 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffdabe0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7}, 0x0) 03:38:00 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tun\x00\x9c;\x98\xfc\x06\x9f\x9fU\xd1\xc2\xec\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0xaaaaaaaaaaaac41, 0x0, 0x0, 0x181) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:38:00 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000057455682000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x8}, 0x0) 03:38:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:00 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:00 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffc90000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xa}, 0x0) 03:38:01 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1577.059285][T29076] kvm: pic: level sensitive irq not supported [ 1577.061264][T29076] kvm: pic: single mode not supported [ 1577.071599][T29076] kvm: pic: single mode not supported [ 1577.077313][T29076] kvm: pic: level sensitive irq not supported [ 1577.095271][T29076] kvm: pic: level sensitive irq not supported [ 1577.102034][T29076] kvm: pic: single mode not supported [ 1577.108347][T29076] kvm: pic: level sensitive irq not supported [ 1577.138049][T29076] kvm: pic: level sensitive irq not supported [ 1577.138720][T29076] kvm: pic: level sensitive irq not supported 03:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1577.141035][T29076] kvm: pic: level sensitive irq not supported [ 1577.161435][T29076] kvm: pic: level sensitive irq not supported [ 1577.182089][T29076] kvm: pic: single mode not supported [ 1577.188491][T29076] kvm: pic: level sensitive irq not supported 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xe}, 0x0) [ 1577.205763][T29076] kvm: pic: level sensitive irq not supported [ 1577.219127][T29076] kvm: pic: single mode not supported [ 1577.221987][T29076] kvm: pic: single mode not supported [ 1577.231746][T29076] kvm: pic: single mode not supported [ 1577.233594][T29076] kvm: pic: single mode not supported 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf}, 0x0) 03:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1577.493169][T29076] kvm: pic: single mode not supported [ 1577.493404][T29076] kvm: pic: single mode not supported 03:38:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000000)) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 03:38:01 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffee0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:01 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000ffffdabe000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:01 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x10}, 0x0) 03:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x48}, 0x0) 03:38:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0x0, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4c}, 0x0) 03:38:01 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000002300000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:02 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffff50000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x60}, 0x0) 03:38:02 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000ffffffc9000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:02 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000004200000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0x0, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:02 executing program 0: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000080)={{0x3, @default}, [@rose, @default, @rose, @remote, @remote, @rose, @bcast, @null]}, &(0x7f0000000000)=0x48, 0x80800) getpeername$netrom(r2, &(0x7f0000000180)={{0x3, @bcast}, [@default, @bcast, @netrom, @rose, @null, @netrom, @remote, @netrom]}, &(0x7f0000000200)=0x48) 03:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x68}, 0x0) 03:38:02 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffff60000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6c}, 0x0) [ 1578.518578][T29346] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1578.532434][T29346] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 03:38:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0x0, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x74}, 0x0) 03:38:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$poke(0x5, r1, &(0x7f0000000140), 0x8001) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f0000000380)={0x80000000, "ee87798446e2055ac869f06239f664d8a0c48a34a030ef224cc1230e676d11e9", 0x2, 0x6, 0x7, 0x42000, 0x1, 0x2}) memfd_create(&(0x7f0000000040)='\x00', 0x4) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) creat(&(0x7f00000000c0)='./bus\x00', 0x80) r4 = open(&(0x7f0000000100)='./bus/file0\x00', 0x141044, 0x10000000010001f) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000240)={{0x5000, 0x6, 0x10, 0xc68, 0x25, 0x8, 0x3ff, 0x1, 0xfffffffffffffb7d, 0xffffffffffff501f, 0x0, 0x8}, {0x2, 0x1, 0x3, 0x2, 0x81, 0xffffffffffff8001, 0x6, 0x4, 0x2, 0x6, 0x401, 0x4}, {0x10000, 0x0, 0x0, 0x41d5, 0x100, 0x10001, 0x0, 0x530, 0xffffffffffffffbb, 0x17d, 0xff, 0x700000000000}, {0x0, 0x4, 0xc, 0x7f, 0x8, 0x54b, 0x5, 0x3fb5, 0x8c, 0x501, 0x7, 0x400}, {0x7004, 0xb8ad66f602d7ef07, 0xa, 0x496f, 0x1, 0x7fff, 0x400, 0x7, 0x5c466788, 0x7, 0x3, 0x80000001}, {0x4c18676ec6c434, 0x4, 0xa, 0x0, 0x5, 0x80, 0x800, 0x7, 0x1, 0x7fff, 0x3, 0x5}, {0x10000, 0xf002, 0xf, 0x6, 0x2, 0x6, 0x9, 0xc16a, 0x5, 0x2, 0x7, 0x1}, {0xd000, 0x7000, 0x3, 0x0, 0x8, 0x2, 0x4, 0x6, 0x799, 0x5, 0x2, 0x9}, {0xf004, 0x1}, {0x0, 0xf000}, 0x40000024, 0x0, 0x17000, 0x200, 0x3, 0x8000, 0xd000, [0x0, 0x81, 0x5, 0x11b]}) io_setup(0x101, &(0x7f0000000000)) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$tun(r4, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xa00000000000000, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) 03:38:02 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:02 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000407f80000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) [ 1578.801855][T29460] QAT: Invalid ioctl [ 1578.820081][T29460] QAT: Invalid ioctl [ 1578.861568][T29460] QAT: Invalid ioctl 03:38:02 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000ffffffee000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7a}, 0x0) 03:38:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x0, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:03 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf0}, 0x0) 03:38:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x0, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:03 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffdfc0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x300}, 0x0) 03:38:03 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x33, 0x800) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='tXa\a\x00', 0xfffffffffffffe15) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f00000000c0)=0x6, 0x4) timer_create(0x7, &(0x7f0000000180)={0x0, 0x24, 0x2, @thr={&(0x7f0000000140)="c64928243806d35c4ccebae3ec0c5f4335b6ddf67e17b6f0f7198e1c613958307d", &(0x7f0000000200)="82b4c8969e65199d37a16c0075af0ebc7018c0fdc2accb84cd249dfe850a854801c59f189025409619772a8ecfba6739159f7974f1305aff4fb47457f2b636a3e52a75a674f54028d14ce6017207e717fc101b0d05b20c81ca08a585dc5d4109057070cb45ac2175e1f00035208d7059"}}, &(0x7f0000000280)=0x0) timer_delete(r2) setsockopt$inet_int(r0, 0x0, 0x2000000000000008, &(0x7f0000000300)=0xfffffffffffffffe, 0x26e) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x500}, 0x0) 03:38:03 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:03 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fffffff5000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x600}, 0x0) 03:38:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x0, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x700}, 0x0) 03:38:03 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000fffffdfd0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:03 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xa00}, 0x0) 03:38:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xe00}, 0x0) 03:38:03 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fffffff6000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:04 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, r0, 0x4}, 0x2c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000180), 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x5]}) sendto$inet(r2, &(0x7f0000000480)="03005f171ec39c8a8589f1f1d8198a665496bf3ef5d44b7f9da2fe2c8ada", 0x1e, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r1, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext={0x1f, 0x1000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x0, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0xe9, 0x6, 0x20, 0x40, 0x0, 0x0, 0x0, 0x4}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) bind$rds(r3, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r4, 0x2) fcntl$dupfd(r5, 0x0, r4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x6, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) 03:38:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x0, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:04 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000407ff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf00}, 0x0) 03:38:04 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:04 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000407f8000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x2000}, 0x0) [ 1580.328560][T29744] IPVS: length: 654 != 8 03:38:04 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x2750}, 0x0) 03:38:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x0, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:04 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000000fff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x3f00}, 0x0) 03:38:04 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x3f000000, 0x0, 0x0, 0x0, 0x4d}, 0x98) 03:38:04 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:04 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fffffdfc000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4800}, 0x0) 03:38:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x0, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x14, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 03:38:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4c00}, 0x0) 03:38:04 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000023000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:04 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x0, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:05 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fffffdfd000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x5027}, 0x0) 03:38:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x719, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x8000, 0x30, 0x101, 0x80000000}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000200)={r1, 0xffffffffffffff39, 0x7}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'dummy0\x00', 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) tgkill(r2, r3, 0x4) recvfrom(r0, &(0x7f0000000640)=""/69, 0x45, 0x10000, &(0x7f00000005c0)=@pppoe={0x18, 0x0, {0x3, @local, 'bridge0\x00'}}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) 03:38:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x0, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:05 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000003f000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:05 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000ffffffffffffffff0000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6000}, 0x0) 03:38:05 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000407ff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6800}, 0x0) 03:38:05 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x1f, 0x7, 0x5, 0x1, 0x9d79, 0x8}, 0x4}, 0xa) connect$inet(r0, &(0x7f0000000080)={0x2, 0x1004e23, @local}, 0x10) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 03:38:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x0, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:05 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6c00}, 0x0) 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7400}, 0x0) 03:38:05 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() mremap(&(0x7f0000182000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f00000be000/0x2000)=nil) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9fcd, 0xe8400) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000280)=0x8) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400080, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x600000000000000, [0x20f, 0x0, 0x40000090], [0xc2]}) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000140)={0x6, 0x0, [{0x9, 0x2, 0x0, 0x0, @msi={0x8, 0x83, 0xc2}}, {0x1000, 0x3, 0x0, 0x0, @irqchip={0x5, 0x10001}}, {0x3, 0x4, 0x0, 0x0, @sint={0x1, 0xe39}}, {0x6, 0x3, 0x0, 0x0, @sint={0x5, 0x401}}, {0x94eb, 0x2, 0x0, 0x0, @msi={0x8, 0x9, 0x1}}, {0x7, 0x0, 0x0, 0x0, @msi={0xf0a, 0x4, 0x7}}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x352, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) set_mempolicy(0x8000, &(0x7f0000000300)=0x4, 0x5) 03:38:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x0, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7a00}, 0x0) 03:38:05 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000fff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:05 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000042000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf000}, 0x0) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x34000}, 0x0) 03:38:06 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x0, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x400300}, 0x0) 03:38:06 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000005245000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:06 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) 03:38:06 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000bedaffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf0ffff}, 0x0) 03:38:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x0, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:06 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x1000000}, 0x0) 03:38:06 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000004552000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:06 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fcfdffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x5}, {0x6}]}, 0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x28) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000040)=@rose) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x2000000}, 0x0) 03:38:06 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:06 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2000400, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x330f, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:38:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x3000000}, 0x0) 03:38:06 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4000000}, 0x0) 03:38:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:07 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000fff000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:07 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000fdfdffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:07 executing program 0: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000140)) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x3}, &(0x7f0000000200), &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x5000000}, 0x0) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6000000}, 0x0) 03:38:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x0, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) 03:38:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:07 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000005729030000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7000000}, 0x0) 03:38:07 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:07 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000c9ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x5, 0x9, 0x2}) listen(r0, 0x0) connect$rose(r0, &(0x7f0000000000)=@short={0xb, @remote, @remote, 0x1, @default}, 0x1c) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x8000000}, 0x0) 03:38:07 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000ffff030000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, 0x0, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000380)=0x8, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x3, 0x8000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000200)={0x0, r2, 0x3}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x80000) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@remote={[], 0x3}, 0x9, 'vlan0\x00'}) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xa000000}, 0x0) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xe000000}, 0x0) 03:38:07 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000f807040000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:07 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000eeffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:07 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, 0x0, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000380)=0x8, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x3, 0x8000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000200)={0x0, r2, 0x3}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) r3 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x80000) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@remote={[], 0x3}, 0x9, 'vlan0\x00'}) 03:38:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf000000}, 0x0) 03:38:07 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff0700000000000000000000000000000000ff07040000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x10000000}, 0x0) 03:38:08 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000005fc0)='/dev/snapshot\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x4) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)=ANY=[], &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000500)}}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00'}) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', 0x0, &(0x7f0000000680)='y\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_mount_image$xfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x800004, 0x0) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x20000000}, 0x0) 03:38:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, 0x0, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:08 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:08 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000008040000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:08 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000f5ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x3f000000}, 0x0) 03:38:08 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000004080000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="9dd8cd0ef3f9d523a07ba1e3033bd5d2374ee53e1a49ae515bef101166524527770c95927f477afa5458ab0ac783b01d96407fcf87e7741b0c8ddaca565d93322651b2c459919905cdcc0baf0ef8d899d1e00d778e8452234d5c2452b4fa7a70083624071e6e4b91732f19675002f6f9d42a09aa6f6b185acf86cd394b7e730b54c9855e9b5ca0697d9fda9bf5142be0164e0fb24d2de89947a97bb2a47a688e2a3ff5b8e5b4bdf71dc4", 0xaa}, {&(0x7f00000000c0)="8a4e7bef84d509522f2c413486670de001", 0x11}, {&(0x7f0000000140)="c0246cbe0682543a5a98c6334df37aa01cea2ff0c528da124bbbea352bf93d6f1100900acdec1eacd1e7c4b1ad1c32c057c39b2028ef62b7d2d90635d1f6d0e14cbd", 0x42}], 0x3}}, {{&(0x7f0000002a80)=@ethernet={0x6, @remote}, 0x80, &(0x7f0000003dc0)}}], 0x2, 0x0) 03:38:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x0, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x48000000}, 0x0) 03:38:08 executing program 0: r0 = timerfd_create(0x4, 0x807ff) timerfd_settime(r0, 0x3, &(0x7f0000005000)={{0x77359400}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}}, 0x0) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4c000000}, 0x0) 03:38:08 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:08 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x50270000}, 0x0) 03:38:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x0, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:08 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000f6ffffff000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:08 executing program 0: r0 = creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000340)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x205, 0x0, &(0x7f0000ff1000/0xf000)=nil, 0x7ff}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getgroups(0x4e7cf4cba20ff60c, &(0x7f00000003c0)=[0xee00, 0xffffffffffffffff]) lstat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') fcntl$setsig(r1, 0xa, 0xe) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000380)) getdents(r1, &(0x7f00000000c0)=""/59, 0x3b) bind$rxrpc(r2, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x0, @remote, 0x7fffffff}}, 0x24) accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) preadv(r3, &(0x7f00000017c0), 0x0, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000180)={@empty, @empty, @broadcast}, 0xc) accept$netrom(r3, &(0x7f0000000240)={{}, [@bcast, @default, @rose, @null, @bcast, @remote, @bcast, @default]}, &(0x7f0000000300)=0x48) 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x60000000}, 0x0) 03:38:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x0, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x68000000}, 0x0) 03:38:09 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000810000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6c000000}, 0x0) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x74000000}, 0x0) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7a000000}, 0x0) 03:38:09 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:09 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:09 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x80000001, 0x244}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x3, 0x20000) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) connect$bt_rfcomm(r1, &(0x7f0000000b80)={0x1f, {0x6, 0x20, 0x5, 0x117912bd, 0x4, 0x8}, 0xf7}, 0xa) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x0, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) fallocate(r0, 0x0, 0xffffffff, 0x7) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x4, 0x0, [], [{0x80000000, 0x1, 0x3, 0x0, 0x401, 0x1}, {0x4, 0x5, 0x40, 0x100000000, 0xfffffffffffffeff, 0xa3e}], [[], [], [], []]}) r3 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='bridge0\x00', 0x10) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000800)}, 0x8804) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)="1cf01a5ebaf2cb2d66dd1480b2e71cfe918eb617977075516d792314fa3975efc7932fa0107380e5d68f6d1071f314a0d2c422cbb831fbff703a51d1423b182f57cdcad3a23f82960de169ffd729ab12095b6d1703ab6f8cc256f4abb9a18e2160de9a6f826bcef10a6c7e543a3fc44d0df55ef09c5f78a339755f2c3f279b5532847ec155352216c6228af460ed67f436feb16cc96cad61b81ee3347762c53a62c6006fc0b509ef96ec2f4d7d30", 0xae}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xe42, 0x10000) sendto$unix(r3, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 03:38:09 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r1, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r2, 0x1, 0xffffffffffffffff, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x9effffff}, 0x0) 03:38:09 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:09 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x80000001, 0x244}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x3, 0x20000) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) connect$bt_rfcomm(r1, &(0x7f0000000b80)={0x1f, {0x6, 0x20, 0x5, 0x117912bd, 0x4, 0x8}, 0xf7}, 0xa) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x0, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) fallocate(r0, 0x0, 0xffffffff, 0x7) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x4, 0x0, [], [{0x80000000, 0x1, 0x3, 0x0, 0x401, 0x1}, {0x4, 0x5, 0x40, 0x100000000, 0xfffffffffffffeff, 0xa3e}], [[], [], [], []]}) r3 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='bridge0\x00', 0x10) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000800)}, 0x8804) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)="1cf01a5ebaf2cb2d66dd1480b2e71cfe918eb617977075516d792314fa3975efc7932fa0107380e5d68f6d1071f314a0d2c422cbb831fbff703a51d1423b182f57cdcad3a23f82960de169ffd729ab12095b6d1703ab6f8cc256f4abb9a18e2160de9a6f826bcef10a6c7e543a3fc44d0df55ef09c5f78a339755f2c3f279b5532847ec155352216c6228af460ed67f436feb16cc96cad61b81ee3347762c53a62c6006fc0b509ef96ec2f4d7d30", 0xae}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xe42, 0x10000) sendto$unix(r3, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf0ffffff}, 0x0) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xfffff000}, 0x0) 03:38:09 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000420000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r1, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r2, 0x1, 0xffffffffffffffff, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:09 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:09 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xffffff7f}, 0x0) 03:38:09 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x80000001, 0x244}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x3, 0x20000) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) connect$bt_rfcomm(r1, &(0x7f0000000b80)={0x1f, {0x6, 0x20, 0x5, 0x117912bd, 0x4, 0x8}, 0xf7}, 0xa) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x0, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) fallocate(r0, 0x0, 0xffffffff, 0x7) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x4, 0x0, [], [{0x80000000, 0x1, 0x3, 0x0, 0x401, 0x1}, {0x4, 0x5, 0x40, 0x100000000, 0xfffffffffffffeff, 0xa3e}], [[], [], [], []]}) r3 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='bridge0\x00', 0x10) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000800)}, 0x8804) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)="1cf01a5ebaf2cb2d66dd1480b2e71cfe918eb617977075516d792314fa3975efc7932fa0107380e5d68f6d1071f314a0d2c422cbb831fbff703a51d1423b182f57cdcad3a23f82960de169ffd729ab12095b6d1703ab6f8cc256f4abb9a18e2160de9a6f826bcef10a6c7e543a3fc44d0df55ef09c5f78a339755f2c3f279b5532847ec155352216c6228af460ed67f436feb16cc96cad61b81ee3347762c53a62c6006fc0b509ef96ec2f4d7d30", 0xae}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xe42, 0x10000) sendto$unix(r3, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 03:38:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r1, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r2, 0x1, 0xffffffffffffffff, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r5) r6 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r8, 0x9, r0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2) setsockopt$sock_attach_bpf(r6, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r3, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:10 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xffffff9e}, 0x0) 03:38:10 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000480000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:10 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x80000001, 0x244}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x3, 0x20000) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) connect$bt_rfcomm(r1, &(0x7f0000000b80)={0x1f, {0x6, 0x20, 0x5, 0x117912bd, 0x4, 0x8}, 0xf7}, 0xa) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x0, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) fallocate(r0, 0x0, 0xffffffff, 0x7) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x4, 0x0, [], [{0x80000000, 0x1, 0x3, 0x0, 0x401, 0x1}, {0x4, 0x5, 0x40, 0x100000000, 0xfffffffffffffeff, 0xa3e}], [[], [], [], []]}) r3 = socket(0x40000000002, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='bridge0\x00', 0x10) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000680), 0x0, &(0x7f0000000800)}, 0x8804) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)="1cf01a5ebaf2cb2d66dd1480b2e71cfe918eb617977075516d792314fa3975efc7932fa0107380e5d68f6d1071f314a0d2c422cbb831fbff703a51d1423b182f57cdcad3a23f82960de169ffd729ab12095b6d1703ab6f8cc256f4abb9a18e2160de9a6f826bcef10a6c7e543a3fc44d0df55ef09c5f78a339755f2c3f279b5532847ec155352216c6228af460ed67f436feb16cc96cad61b81ee3347762c53a62c6006fc0b509ef96ec2f4d7d30", 0xae}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xe42, 0x10000) sendto$unix(r3, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xfffffff0}, 0x0) 03:38:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:10 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:10 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:38:10 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5452, &(0x7f0000000100)={0x4}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x2000) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) 03:38:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 03:38:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3002}}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 03:38:10 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000004c0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:10 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x100000000000000}, 0x0) 03:38:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0xefffffffffffffff) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/net/pfkey\x00', 0x12000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001680)={0x0, @in={{0x2, 0x4e23, @broadcast}}, [0x3ddf, 0x800, 0x1, 0x0, 0xffffffffffffff44, 0x6, 0x3, 0x80000001, 0x4, 0x3, 0x40, 0xfffffffffffffff8, 0x4, 0xff, 0x9]}, &(0x7f0000001780)=0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000018c0)=0xdb) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000000), &(0x7f0000000080)=0x4) 03:38:10 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000408000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:10 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x200000000000000}, 0x0) 03:38:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000940)="2a41d51d457df137449916640c2ac66f3e", 0x11, 0x8000, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='1'], 0x1}}, 0x8000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x300000000000000}, 0x0) 03:38:11 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000680000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:11 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x400000000000000}, 0x0) 03:38:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:11 executing program 0: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='cpuset\x00') exit(0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0xa1) sendfile(r0, r1, 0x0, 0x1) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x500000000000000}, 0x0) 03:38:11 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x600000000000000}, 0x0) 03:38:11 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x700000000000000}, 0x0) 03:38:11 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x800000000000000}, 0x0) 03:38:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xa00000000000000}, 0x0) 03:38:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:11 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000000000000041a9e50b00000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xe00000000000000}, 0x0) 03:38:12 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:12 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000740000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:12 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:12 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(r2, 0x409, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) getpeername$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000003f00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003ec0)={&(0x7f00000006c0)=@deltfilter={0x37d8, 0x2d, 0x30, 0x70bd28, 0x25dfdbfb, {0x0, r3, {0xffef}, {0xf, 0x8}, {0xb, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x708, 0x2, [@TCA_CGROUP_POLICE={0x408, 0x2, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x3, 0xee, 0x20000000200, 0x8, 0xfffffffffffffeff, 0x5, 0x2, 0xfffffffffffffffc, 0x1931, 0x2, 0x50c0, 0x4, 0x1, 0xa1f, 0xff, 0x156, 0x9, 0x5, 0x2, 0x2, 0x8001, 0x0, 0xf52, 0x1ff, 0x1, 0x2ab, 0x80000000, 0x3f, 0x80000001, 0x8, 0x3f, 0x5, 0x20, 0xeb, 0x7f, 0x1f, 0x1, 0x7969, 0x9, 0x20, 0x8, 0x6be, 0x4, 0x8, 0x6, 0x800, 0x1f, 0xfffffffffffffffb, 0x3, 0x5, 0x8, 0xffffffff, 0x7, 0xffff, 0x9, 0x6, 0xfffffffffffffffc, 0x8, 0x0, 0xffffffffffff7fff, 0x80000001, 0x0, 0x7, 0x1, 0x4, 0x3, 0x3, 0x80000001, 0xff, 0x8001, 0x4bdb, 0x3, 0x398, 0xb48, 0x100, 0x0, 0xe4, 0x3, 0x8, 0x10001, 0xe172, 0x8, 0x1421, 0x8, 0x9, 0x7f, 0x1, 0x4, 0x4c, 0x1, 0x6, 0x8, 0x81, 0x4, 0x6, 0x7, 0x1, 0x46b, 0xbee, 0xffffffff80000000, 0x5, 0xf1ae, 0x6, 0x49, 0x1ff, 0x40, 0x3, 0x4, 0x61, 0x2, 0x2, 0x100000001, 0x1, 0x401, 0x3ff, 0x5000000000, 0x5, 0x2, 0x10000, 0x4, 0x7fff, 0xbc, 0x0, 0x4, 0x100000000, 0x100000000, 0x8000, 0x4, 0x7663bebf, 0xffffffffffffffff, 0x100, 0x8, 0x3, 0x2, 0x1, 0x80, 0xffffffffffffffff, 0xcb9, 0x8000, 0x5, 0x101, 0x9, 0x3, 0x0, 0x8, 0x100000001, 0x3, 0x21dc, 0x39f, 0x1ff, 0x5, 0xab88, 0x5, 0x100000001, 0x80000000, 0x9, 0x3, 0xc8ee, 0x2, 0x4, 0x5, 0x1, 0xe3, 0x6f77, 0x0, 0x4, 0x6, 0x9, 0x3, 0x2, 0x8, 0x8, 0x80000000, 0x8, 0xab12, 0x6, 0x1, 0x3, 0x3f, 0xfffffffffffffffe, 0x5, 0x792, 0x9, 0x100000001, 0x9, 0x6, 0x1000, 0x1f, 0x2, 0x0, 0x2, 0x7, 0x400, 0x4, 0x2, 0x3, 0x7, 0x7, 0xdaa, 0x9, 0x8c, 0xffffffffffffffff, 0x1, 0x3, 0x3, 0xfffffffffffffff7, 0x8610, 0x5, 0x3ff, 0x8001, 0x2, 0x100, 0x8, 0x3, 0x0, 0x1, 0x5, 0x101, 0x6, 0x789f, 0x8878, 0x7, 0xffffffffffff0001, 0x2, 0xffff, 0x800, 0x80b0e98, 0x3ff, 0xfff, 0x7, 0x40, 0x101, 0x1, 0x8, 0x7, 0x1f, 0x421, 0x1, 0x20, 0xfffffffffffffff8, 0x4, 0x0, 0x3ff, 0x8001, 0x6, 0xc9, 0xffffffffffffff70, 0x8, 0x1f, 0xffffffff, 0x7f, 0x100000, 0x5, 0x46, 0xb]}}, @TCA_CGROUP_ACT={0x80, 0x1, @m_ipt={0x7c, 0x4, {{0x8, 0x1, 'ipt\x00'}, {0x58, 0x2, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_TABLE={0x14, 0x1, 'raw\x00'}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x4a}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x7}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}]}, {0x14, 0x6, "991a0b01a9f6b487fd41ab8645"}}}}, @TCA_CGROUP_ACT={0x170, 0x1, @m_ife={0x16c, 0x0, {{0x8, 0x1, 'ife\x00'}, {0xac, 0x2, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xffffffffffff15ed, 0x5, 0x20000002, 0x7, 0x7}}}, @TCA_IFE_METALST={0x34, 0x6, [@IFE_META_TCINDEX={0x8}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_TCINDEX={0x8, 0x5, @val=0x5}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x9}]}, @TCA_IFE_DMAC={0xc, 0x3, @remote}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x3a, 0x9, 0x6, 0xffff, 0x7fc00000}}}, @TCA_IFE_SMAC={0xc}, @TCA_IFE_TYPE={0x8, 0x5, 0x3f}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x9, 0xffffffffffff0000, 0x7, 0x0, 0x100}, 0x1}}]}, {0xb0, 0x6, "f85375d302d94b6d2b566d10f994338a2a813022f66fa8747f1ac68a7896ec112488accd37b796ec19a14d3866be8db8d300b67e480283e5b1811f59e7a3e528c008950a5669ae96366a15a73d4f284eb5f6c2bb9fb237fd2ebcfa26cc3fb8ffe0649d5fcda6fef848bba5dd2c75fcf1ef4e126ac732b353bee696d69febae12d794ebde8e065ce3e63e5426f8b77d05aa5c46820998f046e9271157ea73290d2b9fe3e96b42542be61197"}}}}, @TCA_CGROUP_ACT={0x10c, 0x1, @m_gact={0x108, 0x14, {{0xc, 0x1, 'gact\x00'}, {0x1c, 0x2, [@TCA_GACT_PARMS={0x18, 0x2, {0x90, 0x100, 0x20000006, 0x2, 0x7fff}}]}, {0xd8, 0x6, "0037bc784dbd8d3cfb5090e059b8de0102b2e3513ee459da26882a96d8c829c6b1e0e1e0ebd9e07c8caa003cc8fecee433d2061e160358db7fc04a36457551aa7ce40cfabad430e167313a7fc60ddf6982f35ab722c2faaf71c0278eb14b48292886f43df9c7fc199fba3ad85721cac0aa289dc9b30b68262bf7c5dfe0ad56f1b51ce3a24366916cd33fda8a705bb0d4980026c71be6c29029922496a315a9ed0418dc421af80bfdd1d95729225cf651628bdd746ec4d3a2e78acb1aec282067e5903508adf5f9288cef704ab5ac87d260"}}}}]}}, @TCA_RATE={0x8, 0x5, {0x3f, 0x7}}, @filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0x28, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @ipv4={[], [], @multicast2}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xe, 0xffff}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xffff, 0x5}}]}}, @filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x301c, 0x2, [@TCA_CGROUP_EMATCHES={0x28, 0x3, [@TCA_EMATCH_TREE_LIST={0x24, 0x2, @TCF_EM_NBYTE={0x20, 0x2, {0x7, 0x2, 0x5, 0x0, {0x4, 0x9, 0x2, "d0d629d1aaf3c7e7dc"}}}}]}, @TCA_CGROUP_EMATCHES={0x130, 0x3, [@TCA_EMATCH_TREE_LIST={0x40, 0x2, @TCF_EM_IPT={0x3c, 0x9, {0x2, 0x9, 0x5, 0x0, [@TCA_EM_IPT_MATCH_REVISION={0x8, 0x3, 0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xc, 0x2, 'policy\x00'}, @TCA_EM_IPT_MATCH_REVISION={0x8, 0x3, 0x5}]}}}, @TCA_EMATCH_TREE_LIST={0xec, 0x2, @TCF_EM_CONTAINER={0xe8, 0x6, {0x8001, 0x0, 0x7, 0x0, "657745b586b3248751d83239662f32f663207f038f20b03442a114ecf1d629461665695beeb76079a0cbc8b92b1b8147232cdc3677f0bced0461d0fa18d030ee5e8a9f5d08f7e618d55f5b4d3901c38e51514300a7b1defd8757a02ba642a8d282e4c51853ec93ab7c9521849abf57d2fb377258d644ae1f4eab0ffdecaab68e5bd61c2b81e12b169f33e39123580983bb20a4c1f711a72e5fc5f7073e78660322765f167e28c0716479dc5142e5d7339eb6e7392f39f432d732e1b32e66a2cedf11e7f792644fa0fc4e20122a55b7bb8b37bb38566cf169"}}}]}, @TCA_CGROUP_EMATCHES={0x48, 0x3, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, @TCF_EM_META={0x10, 0x1, {0x3f, 0x4, 0x3}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, @TCF_EM_CMP={0x1c, 0x5e74, {0xadc4, 0x1, 0x9, 0x0, {0x1, 0x2, 0x7ff, 0x2, 0x9, 0x3, 0x3}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2}}]}, @TCA_CGROUP_EMATCHES={0x20, 0x3, [@TCA_EMATCH_TREE_LIST={0x1c, 0x2, @TCF_EM_META={0x18, 0x967, {0x400, 0x4, 0x3, 0x0, [@TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_VAR='(']}]}}}]}, @TCA_CGROUP_ACT={0x2e58, 0x1, @m_pedit={0x2e54, 0x9, {{0xc, 0x1, 'pedit\x00'}, {0x2dbc, 0x2, [@TCA_PEDIT_KEYS_EX={0x20, 0x5, [@TCA_PEDIT_KEY_EX={0x1c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}]}]}, @TCA_PEDIT_PARMS_EX={0xee0, 0x4, {{{0x7d17, 0x8, 0xffffffffffffffff, 0x200, 0xe73}, 0x1, 0x8001, [{0x1970000000000, 0x9, 0x6, 0x0, 0x1, 0x1000}, {0x7ff, 0x2, 0x6, 0x1ff, 0x3, 0x7}, {0x8, 0x0, 0x4, 0x100000000, 0x5, 0xffffffffffffffc0}, {0x4d, 0x100, 0x0, 0x3, 0xffffffffffffffc1, 0x80}, {0x0, 0xfffffffffffff801, 0x0, 0x9, 0x80000001, 0x8}, {0x5b8, 0x6, 0x1f, 0x3, 0x7, 0x3}, {0x8, 0x2, 0x3, 0x9, 0x1, 0x7}, {0x5, 0x3713, 0x7, 0xfffffffffffff001, 0x81, 0x200}]}, [{0x1, 0x8, 0x7, 0x80, 0x9, 0xb4}, {0x8, 0x7, 0x100000001, 0x1, 0x2, 0x5}, {0x4, 0x183, 0x1, 0xaf, 0x7, 0x935}, {0x10000, 0x2, 0x368, 0xffff, 0x1ff, 0x7}, {0x2, 0xffff, 0x4, 0x2, 0x7}, {0xff, 0xff, 0x7, 0x80, 0x8, 0x100000001}, {0x10000, 0x401, 0x4570, 0x4, 0x2, 0x7}, {0xfffffffffffffffa, 0x7, 0x8, 0x9, 0x81, 0x8000}, {0x35, 0x9, 0x0, 0x1ff, 0xe3ff, 0x8}, {0x5, 0x1ff, 0x9c, 0x9, 0x2, 0xd1c1}, {0x401, 0xb6, 0x5, 0x9, 0x9, 0x20}, {0x100000000, 0x36a7, 0x2, 0xffffffffe8450a0a, 0x8, 0x9}, {0x6, 0x1, 0x9, 0xfffffffffffffffd, 0x7b0, 0x24}, {0xfffffffffffffffa, 0x2, 0x800, 0x7fffffff, 0x6cfd, 0x101}, {0x6, 0x6, 0x3, 0x7, 0x3, 0xdf3}, {0x10001, 0xd816, 0x5cca, 0x140, 0x81, 0xe5}, {0xc7, 0x0, 0x8, 0x6, 0x80, 0x100000000}, {0x2, 0x10001, 0x0, 0x8, 0x6, 0x8}, {0x8, 0x80, 0x800, 0x80000000, 0x80000000, 0x7}, {0xfffffffffffffffd, 0x1, 0x0, 0x7f, 0x1, 0x80000000}, {0x3, 0x7fffffff, 0x0, 0x5, 0xfffffffffffffffd, 0x800}, {0x100000001, 0x5, 0xff, 0x0, 0x5, 0x8000}, {0x7f, 0x1000, 0x4, 0xfff, 0x9, 0x2}, {0x7, 0x48e, 0x8, 0x80, 0x1ff, 0x6}, {0x1, 0x9c5, 0x40, 0x8001, 0x7, 0x60}, {0x5, 0x2, 0x3, 0x7, 0xee, 0xaee}, {0x7, 0x6, 0x7ff, 0x4, 0x4, 0x1}, {0x4, 0x1, 0x7fffffff, 0x4, 0x100, 0x1}, {0x3, 0x7ff, 0x439, 0xe4d, 0xd5, 0x1}, {0x1800000000000, 0x9, 0x9, 0x3, 0x100, 0x1000}, {0x3, 0x0, 0x2, 0x1, 0x6, 0x100}, {0x9, 0x1, 0x9, 0xbb5, 0x0, 0x81}, {0x1430, 0x1f, 0x1, 0x100000001, 0x8cb, 0x5}, {0x2516, 0x8, 0x3, 0x10000, 0x101, 0x1000}, {0x4, 0x75d, 0x8, 0xfffffffffffffff8, 0x10001, 0x40}, {0x7a2, 0x1d, 0x1, 0x2, 0x5, 0xa4}, {0x2, 0x48, 0x4, 0x0, 0x9e, 0x8}, {0x3, 0xffff, 0xff, 0x800, 0x2, 0xfffffffffffffffd}, {0x0, 0xe4ff, 0x9, 0x7f, 0x4, 0x6}, {0xff, 0x2, 0x8001, 0x84b, 0x9, 0x200000000}, {0x81, 0xc00000000000, 0x8, 0x0, 0x7, 0x1}, {0x800, 0x5, 0x1, 0x9, 0x2, 0x2}, {0x3ff, 0x101, 0x5, 0x6, 0x4b0f7eea, 0x3}, {0x7f, 0x1f, 0x8, 0x9, 0x83, 0x4a27}, {0xbe8a, 0x79c4, 0x3, 0x101, 0x5, 0x70f8}, {0x1435, 0x9, 0x6, 0x2, 0x71a2f6d, 0x1}, {0x4, 0x3f, 0x1, 0x78, 0x0, 0x4}, {0x9, 0x3, 0x1, 0x10001, 0x59, 0x3}, {0x7, 0x4, 0x40, 0x7ff, 0x8001, 0xa15b}, {0xcad, 0x1, 0x4, 0x100000001, 0x4, 0x80000001}, {0x8, 0x1, 0x0, 0xb39, 0x100, 0x7}, {0x4, 0x1, 0x0, 0x7, 0x1, 0x3ff}, {0x7ff, 0x5, 0x80000001, 0x7, 0x9, 0x401}, {0xe9, 0x3, 0xd1, 0x2e91, 0x100, 0x4}, {0x1, 0x723, 0x8, 0xffffffffffffffff, 0x81, 0x3}, {0x3f, 0x2, 0x7, 0x1, 0x8, 0x33}, {0x1ff, 0x8, 0xfff, 0x300, 0x800}, {0x5c6, 0x8, 0x1, 0x9, 0x4944, 0x8001}, {0x7, 0x100000000, 0xffffffffffffb811, 0x5, 0x8, 0x92}, {0x6, 0xf3f, 0xf03d, 0x734, 0x2b800000, 0x800}, {0x7, 0x7f, 0x2, 0xda3, 0x4, 0x1}, {0x6, 0x3f, 0x8001, 0x4, 0x300000, 0x3}, {0x5, 0x6, 0x1, 0x2, 0x3b9, 0x5}, {0x1, 0x9, 0xfffffffffffffefd, 0x2173, 0x16928, 0x200}, {0x0, 0x5, 0x7, 0x100000001, 0x0, 0x5}, {0x5cd, 0x3ff, 0x0, 0xfffffffffffffff7, 0x4, 0x9}, {0x5, 0x80000001, 0x0, 0x3, 0x3, 0x81}, {0x20, 0x0, 0x40, 0x7e9845c9, 0x0, 0xad}, {0xc03a, 0xca, 0x7ff, 0x3f, 0x7fffffff, 0x2}, {0x3, 0x4, 0x10001, 0x9, 0x3, 0x3}, {0x81, 0x4, 0x3, 0x3f, 0x8, 0xffff}, {0x95a1, 0x120000000000000, 0xf5, 0xe8a, 0x800, 0x1}, {0x9aa7, 0x3, 0xee, 0x8001, 0x8, 0x9}, {0xffff, 0x20, 0xffff, 0x100000000, 0x100000001, 0x7}, {0x6a2f611a, 0x1, 0x80000000, 0x7fffffff, 0xcd1, 0x7f}, {0x8, 0x6, 0x972, 0x7f, 0x5, 0x3}, {0x8001, 0x9, 0x2, 0xdd, 0xc5be, 0xd1f}, {0x1, 0x6, 0xff, 0xffffffffffffffff, 0x7, 0x2}, {0x4, 0x1, 0x9, 0x4, 0x9, 0x7fff}, {0x7, 0x3ff, 0x3, 0x6, 0x22, 0x5}, {0x3, 0x3, 0x0, 0xb4, 0x3, 0xf7}, {0x8fcf, 0x100000000, 0xffff, 0x101, 0x100000000000, 0x76d0}, {0x7fffffff, 0x1, 0x8, 0xff, 0x1000, 0x10001}, {0x5, 0x2, 0x40, 0x6, 0xc9, 0x6}, {0x5, 0x1, 0x0, 0x7, 0x800, 0x1}, {0x1000, 0x40, 0xff, 0xfffffffffffffff7, 0x8, 0x8}, {0xffff, 0xfff, 0x100, 0x7f, 0x1, 0x9}, {0x6, 0x6, 0x6, 0x0, 0x101, 0x8}, {0xfffffffffffffff8, 0x8, 0x5, 0x1, 0xfffffffffffffffa}, {0x10001, 0x10001, 0x8001, 0x200, 0x2, 0x1f}, {0x3, 0xffffffff80000001, 0x0, 0x87c0, 0xfffffffffffffffa, 0x7}, {0x8, 0xeeb, 0xcb8d, 0x2700, 0x2, 0x80}, {0x80000001, 0x1, 0x80000000, 0xffff, 0x1, 0x7}, {0x1, 0xfffffffffffffffe, 0x80, 0x5, 0x4, 0x1}, {0x80000000, 0x3f, 0x200, 0x61f1726, 0x200, 0x3e}, {0xdc25, 0xffffffff00000000, 0x80, 0x7, 0x81, 0x100}, {0x1ff, 0xff, 0xfffffffffffffffd, 0x1, 0x7}, {0x1, 0x800, 0x8, 0x2, 0x1, 0x4}, {0x81, 0xe3bb, 0x9, 0x8001, 0x723, 0x3f}, {0xfffffffffffffffa, 0x9, 0xffffffffffff0001, 0x3, 0xff, 0x7}, {0x400, 0x7, 0x314, 0xfffffffffffffffb, 0x7ff, 0x3}, {0x1, 0x3, 0x3ff, 0x10000, 0x6, 0x9}, {0x2, 0x100000001, 0x100, 0x3ff, 0xffffffff, 0x8}, {0x79e4, 0x5, 0x2, 0x0, 0x0, 0x2}, {0xffffffff80000001, 0x2, 0x1, 0x7, 0xb4, 0x5}, {0x2, 0x0, 0x4, 0x7, 0x6, 0x5}, {0x3, 0x6, 0x9, 0x100000000, 0x4, 0x1}, {0x2, 0x8, 0x3, 0x0, 0xc9c, 0x1}, {0x10000, 0xbc, 0x7, 0x5, 0x6}, {0xfac3, 0x6, 0x2, 0x3ff, 0x6, 0x1}, {0x3, 0x5, 0xffff, 0xd0d1, 0xffffffff, 0x91f}, {0x4, 0x5, 0x50, 0x7f, 0x6f7e, 0x7}, {0x73e7, 0x10001, 0x10000, 0xffffffffffffff84, 0x0, 0xb8df}, {0x4d, 0x9, 0x660, 0x7fff, 0x8, 0x101}, {0xfffffffffffffff2, 0x0, 0xf7a, 0x2, 0x1, 0x5}, {0x9, 0x10000, 0x40, 0xfa}, {0x43, 0x2, 0x1ff, 0x2, 0x7, 0x294}, {0x101, 0x81, 0x2, 0x6, 0xf28, 0xdd}, {0x1f, 0x3f, 0xa5, 0x3, 0x3f}, {0xffffffffffff0000, 0xffffffff, 0x68, 0x2bc0, 0x6, 0x6}, {0x7cc, 0x20, 0x7, 0xf076, 0x8, 0x1000}, {0xfffffffffffff6c7, 0x100000001, 0x4, 0x4, 0xfff, 0x81}, {0x9, 0xfffffffffffffffb, 0x2, 0x1ff, 0x1, 0x9}, {0x1, 0x8, 0x100, 0x3, 0x80000000, 0x5}, {0x6, 0x1b, 0x401, 0x0, 0x0, 0x401}, {0x7, 0xce1, 0x42, 0xffff, 0x800}, {0xffff, 0x6, 0x7ef8, 0xfffffffffffffff9, 0xa370, 0x573}, {0x3, 0x4, 0x9, 0x0, 0x0, 0x5}], [{0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x4}, {0x7}, {0x5, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x3}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x5}, {}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x7, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x4}, {}, {0x5}, {0x3}, {0x3}, {}, {0x5, 0x1}, {0x2, 0x1}, {}, {0x7, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x5, 0x1}, {}, {0x5}, {0x7, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x6, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x7}, {0x7, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x4}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x5}, {0x7}, {0x4}, {0x7, 0x1}, {0x4}, {0x2, 0x1}, {0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x5, 0x1}, {0x2}, {0x3}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {}, {0x7}, {0x4, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x18c, 0x5, [@TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x54, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x54, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0xe403a09a961bf73d}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0xffffffffffff8001, 0x6, 0xffffffffffffffff, 0x7fff, 0x3ff}, 0xbcb, 0x100000000000000, [{0x6f67, 0x9, 0x0, 0xb89f, 0xffffffffffffffff, 0x80000000}, {0xbe, 0x4, 0xc07, 0x6, 0x1, 0xfff}, {0x9a4c, 0x8000, 0x5, 0xed03, 0x2, 0x5}]}, [{0x55ab, 0x6, 0x80, 0xff, 0x40, 0x7ff}, {0xcea, 0x81, 0xa4ed, 0x0, 0x26a7, 0x3}, {0x9, 0x20, 0x0, 0x0, 0x547, 0xfffffffffffffff8}, {0x81, 0x6, 0x478, 0xc68, 0x1, 0x5}, {0xe3f, 0x7, 0x63d21d51, 0x0, 0xfffffffffffffbed, 0x80}, {0x6, 0x0, 0xae7, 0x5, 0x5}, {0x81, 0x800, 0x5, 0x6, 0x7ff}, {0x8, 0xfffffffffffffff8, 0x1000, 0x9, 0xffffffff80000001, 0x3f}, {0x5, 0x8, 0x7, 0x351, 0x1, 0x2}, {0x5, 0x6, 0x2, 0x7, 0x8, 0x3}, {0x5, 0x80000001, 0x43b4, 0x1, 0x0, 0x92}, {0x800, 0x8, 0xe0d2, 0x5ba, 0x8, 0x5}, {0x8, 0xcb86, 0x9, 0x0, 0x3ac6, 0xffffffffffffffff}, {0x40, 0x5, 0x9, 0x4, 0x3, 0x3b7}, {0xf167, 0x5, 0x2, 0x23e98396, 0xb8fa, 0x8}, {0x6, 0x7, 0x9, 0x1, 0x5, 0xd133}, {0x7, 0xcf2, 0x7f, 0x1}, {0x200, 0x6, 0x3, 0x2, 0x4, 0x9}, {0x7, 0x3, 0x2, 0x1, 0x3e, 0x7f}, {0x3f, 0x9, 0x80000000, 0x2, 0x80000001, 0x6}, {0x9, 0x0, 0x6, 0x1000, 0x40, 0x2}, {0x3, 0x6b9f, 0xfffffffffffffffc, 0x9, 0xfffffffffffffe01, 0x2}, {0x8000, 0x10001, 0xfffffffffffffffe, 0x3, 0x0, 0x3}, {0xa6, 0xff4, 0x7, 0x7ff, 0x470000, 0x10000}, {0x9, 0x3b, 0x3, 0x9, 0x10001, 0x10001}, {0x3, 0xc2, 0x81, 0x100000000, 0x6, 0x21}, {0x9, 0x1, 0x0, 0x5, 0x0, 0x7}, {0xfffffffffffffff9, 0x7, 0xfffffffffffffbff, 0x2, 0x8, 0x6}, {0x80000001, 0x7, 0x7ff, 0x7f, 0x1, 0x6}, {0xf375, 0x100000000, 0x3f, 0x7, 0xd0b4, 0x8}, {0x80000001, 0xfffffffffffffffc, 0x9, 0x1, 0x6, 0xffff}, {0x1f, 0x7, 0x401, 0x7, 0x6, 0x2}, {0x1, 0x0, 0x1, 0x0, 0x7, 0x7}, {0x401, 0x800, 0x7, 0x1, 0x6}, {0x1000, 0x408, 0xff, 0xffffffffffff3b00, 0x0, 0x6}, {0x3, 0x7, 0x1, 0x0, 0x9, 0x8}, {0x1, 0x1000, 0x7fff, 0x8, 0x7fffffff, 0x5}, {0x0, 0x2, 0x1, 0x6, 0x400, 0x10000}, {0x5, 0x200, 0x101, 0x0, 0xfff, 0x2}, {0x3, 0x5, 0x9, 0x5d5661f1, 0x800, 0x9}, {0x5b, 0xbe, 0x2, 0x5, 0x4, 0x10001}, {0x6f73, 0x88c9, 0x3, 0xfffffffffffffff7, 0x5, 0x5}, {0x1, 0x9, 0xc3, 0x2, 0x10000, 0x2}, {0x3, 0x100, 0x2, 0x100000001, 0x2, 0x1}, {0xe3f, 0xd8a5, 0x4, 0x5, 0x9, 0xfffffffffffff1a9}, {0x5, 0x9, 0x1f, 0x5, 0x56a, 0x7ff}, {0x9, 0x7, 0xfffffffffffffff8, 0x5, 0x3ff, 0x1f}, {0x0, 0xebf, 0x6, 0x400, 0x6, 0x2}, {0x6, 0xe8, 0x6, 0x3, 0xfffffffffffff9e3, 0x7ff}, {0xd7a1, 0x1f, 0x8, 0x4, 0x5, 0x6df2}, {0xf74, 0x2, 0x100000001, 0x9, 0xa6, 0x5f6}, {0xfff, 0x8, 0x864, 0x3f, 0x7fff, 0x6}, {0x1f, 0x7, 0x80000001, 0x1, 0x7}, {0x2, 0xffffffffffffff00, 0x1ff, 0x1ff, 0x1, 0x4}, {0x7f, 0x0, 0x8, 0x8, 0x1d, 0x9}, {0x4, 0x8, 0x6, 0x2, 0x8, 0x2}, {0x4, 0x1000, 0x2, 0x2, 0xd541, 0x5}, {0x1, 0x1, 0x1, 0x2, 0xffffffffffff1ce7, 0x9}, {0x7, 0x3695, 0x7, 0x9, 0x5, 0x1}, {0xc37, 0x878f, 0x0, 0x7, 0x3, 0x4}, {0x1, 0x0, 0x3, 0x6, 0x4, 0x94}, {0x0, 0x1, 0x9, 0x1, 0x8, 0x7}, {0x401, 0xca, 0x7, 0x2, 0x7fffffff, 0xfffffffffffffffd}, {0x5, 0x0, 0x7fff, 0x549, 0x1f, 0x8}, {0x10000, 0x8001, 0x513530fe, 0x9, 0x9, 0x10001}, {0x7, 0x7fffffff8000, 0xbf2d, 0xffffffff80000000, 0x800, 0x9}, {0x8, 0x3, 0x8, 0x100000000, 0x5254, 0x7}, {0xe5, 0x7ca1f6da, 0x7ff, 0x8, 0x4df157bc, 0x3f}, {0x1, 0x100, 0xfffffffffffff801, 0x95, 0x6d888655, 0x9}, {0x4, 0x3, 0x7, 0x800, 0x2, 0x80}, {0xb091, 0x6, 0xfffffffffffffffd, 0x5, 0x7, 0x13}, {0x531, 0x1, 0x8001, 0x80, 0x9, 0x134}, {0x5, 0xe1f, 0x5, 0x9, 0x4d, 0xd0}, {0x80, 0x5, 0xc328, 0x3, 0xd8b2, 0x21800}, {0x7ff, 0xfffffffffffffe6e, 0x1, 0x2, 0x278faec6, 0x2}, {0xc85, 0xffff, 0x7, 0x7, 0x8, 0x3}, {0x6, 0x81, 0x8001, 0x1000, 0xd96, 0x1ff}, {0xffff, 0x69f8, 0x6, 0x9, 0x10300000, 0x100000001}, {0x401, 0x7, 0x2, 0x100000000, 0x609af991, 0xffffffff}, {0xfff, 0xfffffffffffffe4d, 0x1000, 0x8001, 0x7fff, 0x10001}, {0x7, 0x5, 0x6, 0x7ff, 0x1}, {0x100000000, 0x6, 0x0, 0x9, 0x5, 0x4}, {0x81, 0x100000000, 0xfffffffffffff000, 0xffffffffd1d775bb, 0xfffffffffffffeff, 0x3}, {0x3ff, 0xfffffffeffffffff, 0x0, 0x2, 0x0, 0xff}, {0xb29, 0x3f, 0x4, 0x6, 0x1ff, 0xffffffffffffffff}, {0x7, 0x0, 0x3, 0x5, 0x100, 0x6}, {0x3, 0x7, 0xa0, 0x1ff, 0xffff, 0xd77e}, {0x4, 0x7fff, 0x2, 0x2, 0xa1, 0xc393}, {0xbfd, 0x6, 0xffffffff, 0x4, 0x16, 0x8}, {0x2, 0x9, 0x4, 0x4, 0xdf, 0x6}, {0x1, 0x6, 0xa, 0x1, 0x100, 0xffffffffffffffe0}, {0x5, 0x8, 0x3, 0x4000800, 0x4, 0x1000}, {0x9, 0x9, 0x8, 0x6, 0xfffffffffffffffa, 0x70}, {0x80000000, 0x5, 0x0, 0x8, 0x24, 0x8}, {0x8, 0x791, 0x8, 0x8, 0x6948ff4d, 0x1ff}, {0x5, 0x7, 0x1, 0xfffffffffffffff8, 0x8001, 0x40}, {0x5986aa7e, 0x704, 0x401, 0x3, 0x100, 0xe34}, {0x1, 0x8, 0x100, 0x2, 0x1, 0x8001}, {0x7, 0x8001, 0xc1c7, 0x3, 0x2, 0x1}, {0x2a3, 0x4, 0xe1, 0x8, 0x9, 0x5}, {0x9, 0x0, 0x9, 0x10001, 0x64cd, 0x7}, {0xf452, 0x4, 0x3, 0x2575a818, 0x1000, 0x9}, {0x1, 0x1, 0x5c, 0x3, 0x1}, {0x36e, 0x4, 0x100000000, 0xdb1f, 0x7, 0x10001}, {0x8, 0x5, 0x2, 0x65, 0x7}, {0x9, 0x6, 0x9, 0x10001, 0x9, 0x6}, {0x1, 0x8, 0x0, 0x3, 0x1, 0x3000}, {0xbafc, 0x7f, 0x400, 0x100, 0x312, 0x8}, {0x0, 0x5, 0xfffffffffffffff8, 0x1, 0x8, 0x3}, {0x80000000, 0x200, 0x4, 0x9, 0x7, 0x9}, {0x7, 0x4, 0x8, 0xffffffffffffffff, 0x1, 0x9}, {0x3f, 0x3, 0x0, 0x3ff, 0x74, 0xffff}, {0xffff, 0x0, 0x9, 0xadb, 0x9, 0x2}, {0x8001, 0x5, 0x100000001, 0x1, 0x2, 0x7}, {0x3, 0xfbf, 0x4, 0x5, 0x2, 0x80}, {0x7, 0xfffffffffffffffe, 0x1, 0x4, 0x25c7, 0x78}, {0x6e, 0x1f, 0x7, 0x800, 0x5f88b021, 0x40}, {0x200, 0x7, 0x7, 0x8, 0x1, 0x9}, {0x2, 0x8a5, 0x6, 0x7fffffff, 0x1, 0x80000000}, {0x200, 0x9, 0x2b, 0x6, 0x2, 0x9}, {0x300000000000000, 0x4019, 0x0, 0x1ff, 0x10000, 0x7f}, {0x10001, 0x4000000000000000, 0x7fffffff, 0x4, 0x6, 0x40}, {0x2000000000000000, 0x200, 0x3, 0x5, 0x5, 0x200}, {0x2, 0x2, 0x2, 0x40, 0x40, 0x7fffffff}, {0x7ff, 0x7, 0x7fffffff, 0x7, 0x80000000, 0x4}, {0x4, 0x1, 0x7, 0x100000000, 0x4, 0x4}, {0x5, 0xfffffffffffffe00, 0x2, 0xaae9, 0x10001, 0x8}, {0x2, 0x3, 0x81, 0x5, 0x8000, 0x6}], [{0x4, 0x1}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x7}, {0x2, 0x1}, {0x2}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {0x7}, {0x5}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x5}, {0x6}, {0x7, 0x1}, {}, {0x4}, {0x2}, {0x7, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {0x7}, {0x7}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x5}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {}, {0x3, 0x1}, {0x1}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x7}, {0x1}, {0x3, 0x1}, {}, {0x6, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x7}, {0x4, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x1}, {0x2, 0x1}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x7}, {0x4}, {0x0, 0x1}, {0x5}, {0x7, 0x1}, {0x1}, {0x2}, {0x5, 0x1}, {}, {0x5}, {0x7}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x0, 0x1}, {0x7}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x2}, {0x2}, {0x7, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x2}, {0x3, 0x1}, {0x7}, {0x1}, {0x5, 0x1}, {0x7}, {0x7, 0x1}, {0x7}, {0x4}, {0x4}, {0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0xcea202fa36c52223}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x2c, 0x5, [@TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}]}]}, @TCA_PEDIT_PARMS_EX={0xe98, 0x4, {{{0x8, 0x8, 0x10000000, 0x8, 0x8001}, 0xfff, 0xb47, [{0x4a, 0x7535641, 0x0, 0x1f, 0x7b}, {0x4, 0x8, 0x0, 0x7, 0xffffffffffffffa4, 0x8}, {0x1, 0x4, 0x2, 0x1ff, 0x18, 0xc000000}, {0xff, 0x43, 0x0, 0x6, 0x1, 0x6}, {0x400, 0x400, 0x5, 0x8, 0x2, 0x47e}]}, [{0x5, 0x8, 0x7fffffff, 0x0, 0x9c95, 0x3}, {0x7, 0x3, 0xfffffffffffffff9, 0x1, 0x7, 0x8}, {0xc0000000000000, 0x800, 0x2c, 0x2, 0x0, 0x800}, {0x800, 0x7fffffff, 0xfff, 0x34, 0x80}, {0xfffffffffffffff7, 0x7fff, 0x8, 0x207d1007, 0x8}, {0x9, 0x7fff, 0x8001, 0x2, 0x5, 0x6}, {0xfff, 0x4, 0x3, 0x225, 0x2, 0x7}, {0x0, 0x7, 0x6, 0x10000, 0x6, 0x4a}, {0x3ff, 0x1, 0x8000, 0x77a8, 0x100000001, 0x3}, {0x4, 0x7, 0x4, 0x3, 0x400, 0x6}, {0x80000000, 0xff, 0x1, 0x8000, 0x2, 0x100}, {0x8, 0x7, 0x101, 0x2e, 0x8, 0xf30000000000000}, {0xffff, 0x21, 0x100000000, 0xfffffffffffffc00, 0x80, 0x9}, {0x8, 0x1, 0x10000, 0x2, 0x1, 0x8}, {0x7, 0x9, 0x7fffffff, 0x3, 0x8b4, 0x9}, {0x1f, 0xd591, 0x3ff, 0xf5, 0x3}, {0x200, 0x2, 0x985d, 0x10000, 0x1000, 0x2}, {0xfffffffffffffffd, 0x3, 0x5, 0x7, 0x3, 0x4}, {0x1, 0x8676, 0xc410, 0x6, 0x6, 0xb0}, {0x555f, 0x50000000, 0x7, 0x4, 0x2, 0xd929}, {0xffffffffffffff00, 0x3, 0x8, 0x0, 0x5, 0x1}, {0x0, 0x3, 0x2, 0x4, 0x81, 0x80}, {0x200, 0xfffffffffffff000, 0x3, 0x100, 0x8, 0x10000}, {0x1, 0xffffffffffff7fff, 0x7fffffff, 0x8, 0x400, 0x7f}, {0x8, 0x100000001, 0x1, 0x67, 0x9, 0x200}, {0xffffffffffffff6c, 0x4, 0x0, 0x2, 0xffff, 0x401}, {0x5, 0x200, 0x3e0, 0x8, 0x7fff, 0x80}, {0x3f, 0x20, 0x9, 0x7, 0x1}, {0x5, 0x36f5, 0x0, 0x6, 0x0, 0xffff}, {0xe11, 0x100000000, 0xfffffffffffffffc, 0x8, 0xea90, 0x48cb}, {0x1, 0x8, 0x10000, 0x3ff, 0xb68, 0x101}, {0x6, 0x9, 0x125, 0x22a, 0x7f, 0x100000000}, {0xfffffffffffffe01, 0x7fffffff, 0x1f, 0x9, 0x1, 0x8}, {0xfffffffffffffff7, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x80000001}, {0x4, 0x401, 0x20, 0x0, 0xfffffffffffffff7, 0x53}, {0x6, 0x200, 0xef3a, 0x7, 0x6, 0x10000000000000}, {0x1, 0x2, 0x100000000, 0x8, 0x0, 0xd4}, {0x1, 0x9, 0x3, 0x6, 0x9, 0x101}, {0x1, 0x3, 0x200, 0xfffffffffffff800, 0xe0a, 0xbc13}, {0x101, 0x0, 0x4, 0x8, 0x500, 0xff}, {0x1, 0xbb, 0x80000000, 0x7, 0x1f, 0x20}, {0x4, 0x5, 0xffffffff, 0x2, 0x4, 0x1ff}, {0x7, 0x6, 0x6, 0x1, 0x0, 0x100000000}, {0x0, 0x4, 0x10a6, 0x1, 0x4, 0x81}, {0x2, 0x3, 0x100000000, 0x74, 0x6, 0x64}, {0x7, 0x7fffffff, 0x2, 0x3f, 0x40, 0x3}, {0x4, 0x6b9, 0x3, 0xffffffff, 0x4, 0x8001}, {0x8, 0x200, 0x2, 0xd, 0x0, 0x5}, {0x8001, 0x3, 0x4380, 0x3eb31ab, 0x7f, 0x100}, {0x101, 0x5, 0x0, 0x3f, 0x7, 0x3}, {0xfffffffffffff000, 0xbe43, 0xfffffffffffff001, 0xf98, 0x4, 0x9}, {0x2, 0x800, 0x6, 0x9e, 0x38, 0x400}, {0x1000, 0x1, 0xcc, 0x8, 0x1, 0x1}, {0x42a8, 0x8, 0x1a76, 0x5, 0x9, 0x5}, {0x7fff, 0x1, 0x1, 0x882c, 0xc2, 0x10000}, {0x8, 0x6e44, 0xeff4, 0x3, 0x0, 0x6}, {0x1000, 0xfff, 0x3f, 0x3, 0x5, 0x1}, {0x0, 0x5, 0x7fffffff, 0xffff, 0xc037, 0x9}, {0x7fffffff, 0x0, 0x15, 0x401, 0x1, 0x2e8}, {0x4, 0x8, 0xfffffffffffffe01, 0x0, 0x20, 0x9}, {0x5, 0x0, 0x6, 0x10001, 0x4e, 0xfffffffffffff8fa}, {0x7, 0x9, 0x1, 0x9, 0x81, 0x7ff}, {0x5ffc, 0x3f, 0x20000000000000, 0x80000000, 0x1, 0x2}, {0x85, 0x12000000, 0x8, 0x0, 0x4, 0x1}, {0x9, 0x100, 0x3, 0x8000, 0x4, 0x1}, {0x8, 0xffffffffffff0001, 0x3, 0x200, 0x3f, 0x10000}, {0x8, 0x94bc, 0x101, 0x0, 0x7fff, 0x8}, {0x1, 0xfffffffffffffff8, 0xffffffff, 0xfff, 0x5, 0x3}, {0x80, 0x9, 0x4, 0x4, 0x6, 0x8}, {0x20, 0x8, 0x7, 0x5, 0x0, 0xfffffffffffffffb}, {0x4, 0x560, 0x3a3f, 0x100, 0xfffffffffffff001, 0x6}, {0x8, 0x3, 0x100000000, 0x2, 0x81, 0x959}, {0x1f, 0x3, 0x6, 0x4, 0x4, 0x6}, {0x8000, 0x6, 0xb7, 0x5, 0x3fb, 0x40}, {0x200, 0x3, 0x10000, 0x9}, {0x5, 0x8, 0xf9, 0x81, 0x81, 0x7}, {0x4, 0x1f0, 0xc4, 0x0, 0x24, 0x6}, {0x7, 0x54fd, 0x401, 0x8, 0x1000, 0x6}, {0x7133, 0x100, 0x0, 0xa61, 0x1, 0x3}, {0x100000001, 0x6, 0xffff, 0x3f, 0x1f, 0xfff}, {0x3, 0x1, 0x6, 0x12de14a6, 0x5, 0x7}, {0x0, 0x0, 0x7f, 0x7, 0x4, 0x101}, {0x7f, 0x9, 0x0, 0x7f, 0xe4f, 0x9}, {0x3, 0x0, 0x3f, 0x56, 0x10001, 0x116b}, {0x7ff, 0x123, 0x5, 0xfffffffffffffff8, 0x7fff, 0x1ff}, {0x9, 0x100000001, 0xfffffffffffffffa, 0x6, 0xe39e, 0x7fffffff}, {0x9, 0x10001, 0x8138, 0x7f, 0x0, 0x1}, {0xb63, 0x8, 0x40, 0x9, 0x8000, 0x70000000}, {0x1, 0x7ff, 0x10001, 0xf5d, 0x400, 0x7f}, {0x80000000, 0x80, 0x81, 0x8000, 0x3}, {0x0, 0x7fffffff, 0x400, 0x6, 0x1ff, 0x3}, {0x40, 0xffff, 0x100000000, 0x7ff, 0x6, 0x9}, {0x81, 0xe62, 0x59, 0x0, 0x4, 0x927}, {0x100000000, 0x935, 0xf97, 0x0, 0x7, 0x9}, {0x3, 0x6, 0x2, 0x1, 0x4, 0x5}, {0xa13, 0xe77, 0x6, 0x3ff, 0xffffffffffffffff, 0x5d}, {0xffffffff, 0x4, 0x6, 0x1, 0x1, 0x5}, {0x1000, 0x0, 0x2, 0x7810, 0xf7, 0x3ff}, {0x4, 0x66, 0xffffffffffff0000, 0x3, 0x7, 0x101}, {0x3, 0xfffffffffffffe01, 0x100000001, 0xfa6, 0xfffffffffffff000}, {0xffff, 0x1, 0x5, 0x100000000, 0x1, 0x2}, {0x100000000, 0x4, 0x8fc, 0x0, 0x2, 0x20}, {0x9, 0x9, 0x8e, 0x5b32, 0x8, 0x2}, {0x3ff, 0x200, 0x6, 0x0, 0x331, 0x101}, {0x8000, 0x598, 0x40, 0x0, 0x6, 0x2}, {0x9, 0x100, 0x2, 0x0, 0x2, 0x5}, {0x80, 0x5, 0x4, 0x8001, 0x1000, 0xc6}, {0x101, 0x3, 0x9, 0x8, 0x3, 0x5}, {0x101, 0x8, 0x77a, 0x742b6fea, 0x0, 0x7ff}, {0x6, 0x6, 0x5, 0x1, 0x100}, {0x4, 0xe112, 0x3, 0x3, 0x1, 0x2}, {0x559, 0x7ff, 0x8, 0x8000, 0x10000, 0x10001}, {0x10001, 0xc796, 0x1000, 0x7fff, 0xfff, 0x9}, {0x1f, 0x0, 0x8, 0x2, 0x7, 0x8f7}, {0x8, 0xfffffffffffffffd, 0x2, 0x800, 0x6}, {0x2, 0x7, 0x100000001, 0x400, 0x1, 0x400}, {0x1, 0x7, 0x2, 0x4, 0x1, 0x9}, {0xfffffffffffffffc, 0x5, 0x80000001, 0x6, 0x4, 0x5}, {0x10000, 0xa7b, 0x0, 0xfffffffffffff001, 0x0, 0xde}, {0xfffffffffffffc00, 0x1f, 0x6, 0x9, 0x81, 0x6}, {0x5, 0x600242d8, 0x6, 0x1, 0x4, 0x5}, {0x98d9, 0x3f, 0x400, 0xf80, 0x6, 0xffffffffffffff81}, {0x4d4, 0x7f, 0x0, 0x6, 0x100}, {0xa0b6, 0x7fff, 0x1, 0x100, 0x5, 0x9}, {0x81, 0x80000001, 0x6, 0x3, 0x1, 0x1}, {0x4, 0x7, 0xf3, 0x8, 0x7, 0x20}, {0x5, 0x3, 0xffffffffffffffe1, 0xfffffffeffffffff, 0x3f, 0xffffffffffffff7f}, {0x3b, 0x6, 0x42dc6eed, 0x9, 0x40, 0x7}], [{0x7, 0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x0, 0x1}, {0x7, 0x1}, {0x7, 0x1}, {0x4}, {0x6, 0x1}, {0x2}, {0x7}, {0x0, 0x1}, {0x0, 0x1}, {0x6, 0x1}, {0x7}, {0x7, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x7}, {0x7}, {0x5}, {0x4}, {0x5}, {0x7, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {}, {0x6}, {0x1, 0x1}, {0x7, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {0x5}, {0x2}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x3}, {0x3}, {0x5, 0x1}, {0x7}, {0x7, 0x1}, {}, {0x1}, {0x4}, {0x1}, {0x7}, {0x3, 0x1}, {0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {}, {0x2}, {0x7, 0x1}, {}, {}, {0x5}, {0x7, 0x1}, {0x2}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {0x5, 0xb5c9d4ade5ba6272}, {0x4}, {0x5}, {0x2}, {0x5}, {0x4, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x7, 0xe8a154eb809a565b}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x3}, {0x7}, {0x5}, {0x1, 0x1}, {0x5, 0x1}], 0x1}}]}, {0x84, 0x6, "ac6254934e2cea11c0899598671fdb920a9323407cb26ce8c8e0baa32eac4f12b6bbdd57fd370e75e492625221cf8ae6c98976f28a415dae96fe49d9ca7b40fb9b73f1da60d9522df09bbf5cc1674383c801893d38184301271c06a6cd5bab5aa7aecb0a4f284feec093666ce31db1b5a4dbc6cffba9256136e401db075e618e"}}}}]}}, @TCA_RATE={0x8, 0x5, {0x1ff, 0x4ae}}, @TCA_CHAIN={0x8, 0xb, 0xfffffffffffff7e1}, @TCA_CHAIN={0x8, 0xb, 0x800}, @TCA_CHAIN={0x8, 0xb, 0x23b}, @TCA_RATE={0x8, 0x5, {0x4, 0x1}}, @filter_kind_options=@f_matchall={{0x10, 0x1, 'matchall\x00'}, {0x4}}]}, 0x37d8}, 0x1, 0x0, 0x0, 0x404c010}, 0x80) open(&(0x7f0000000100)='./file0\x00', 0x113000, 0x11) 03:38:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf00000000000000}, 0x0) 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x1000000000000000}, 0x0) 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x2000000000000000}, 0x0) 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 03:38:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x1, 0x0, 0x0, 0xa, 0x6, 0x2}, 0x20) 03:38:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4800000000000000}, 0x0) 03:38:13 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:13 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x4c00000000000000}, 0x0) 03:38:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:13 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000000000000000007a0000000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = fcntl$dupfd(r0, 0x40000000000000, r0) accept4$vsock_stream(r1, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x4, 0x6}, {0x5400000000000, 0x6}], r2}, 0x18, 0x1) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x5027000000000000}, 0x0) 03:38:13 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000002300000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x4}]}, 0x30}}, 0x0) pkey_alloc(0x0, 0x1) 03:38:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 1589.282057][ T333] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 1589.321270][ T333] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6800000000000000}, 0x0) 03:38:13 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:13 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x6c00000000000000}, 0x0) 03:38:13 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000003f00000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x10, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x12000) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000180)=""/46) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000140)='nfs\x00', 0x0, &(0x7f0000000100)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x208500, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f00000000c0)={0x7, 0x1}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000200)={0x4000, 0x7e42514ad757da98, 0x200, 0x800, 0x3}) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000040)=""/11) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7400000000000000}, 0x0) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x7a00000000000000}, 0x0) 03:38:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001580)='/dev/uinput\x00', 0x4000000000000006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x400040) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x2, 0x7, 0x8, 0x4, 0x7, 0x29a0}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) 03:38:13 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 1589.818322][ T567] input: syz1 as /devices/virtual/input/input612 03:38:14 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:14 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 03:38:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:14 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000be5a94100000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:14 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) listen(r0, 0x0) connect$rose(r0, &(0x7f0000000000)=@short={0xb, @remote, @remote, 0x1, @default}, 0x1c) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fff, 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x40, 0x4, &(0x7f0000000100)=0x100}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x711}) 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 03:38:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000fa03000000feffff7a0af0fff8ffff946c1d740edc672de76f8f235de5ae01f0ff00000000b7060000fffff3fbf897050000000000650404000100fbff0304000001007d60b72343fad55e2d7cfd0f033df4ff030000000000004f0a00fe00ad8fb0c687e851000000850000000dfd6a23961ca24c55b5013ff35e994d11d7f08921d8c30dd3629b75"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 03:38:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x1) clone(0x802100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 03:38:14 executing program 1: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000055aa4546492050415254", 0x48, 0x1c0}]) 03:38:14 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) 03:38:14 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 03:38:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="b90703e6680d698ca59e40f02cead5dc77ee41dea43e63a377fb8a977c3f1d1700040000d82148a2ac14141ee049eb98713f046740466a4be1363417ef6c9079a2ee9747b34b8182e40b2572d6a20963922d9a4fe66befe41f827286784adb78b94d873ae3bfb84e9eb7d54b40b4f30ff6a20c46aefc11e5d52772b76f4087ac3feb872373c167d2ca3c5bfa6a6eac5ca288efc03068d22d43d5d97f000000000000000cc4168ead0a3fc779213a717fbc88673bb3a02ac6d4b6fb26a972ab970dc8695f97528a1c3af778469949ed1629da9c8cb1880e35ad6fb71e34fcdbdadc83d27eac154347cecaa7db0e19b28079494d880068030b5711a42db4712989a4c1b9ef2748878fd7270b90bc83c0d7a83210f9a0bf427f37272548e76fa54057e34c2a7350e24b0eb6e5ef1d399a7b7c0de85ce183aa995b1349bc", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1590.382439][ T2490] print_req_error: I/O error, dev loop1, sector 64 flags 0 [ 1590.399139][ T2490] print_req_error: I/O error, dev loop1, sector 256 flags 0 [ 1590.408038][ T804] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 1590.445712][ T2490] print_req_error: I/O error, dev loop1, sector 512 flags 0 [ 1590.454186][ T804] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x2}, 0x0) 03:38:14 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000005244534b00000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) 03:38:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x80000000000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, r2, 0x0, 0x10, &(0x7f0000000340)='veth1_to_bridge\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0xc2, 0x3, 0x3f, 0x1, 0x0, 0x9, 0xc, 0x2, 0x1, 0x8, 0x6, 0x5, 0xcdd5, 0xfffffffffffffffe, 0x5b0, 0x5a1, 0x1ff, 0x8001, 0x5, 0x3, 0x3, 0x3ff, 0x2, 0xff, 0x9, 0x800, 0x0, 0x81, 0x12, 0x1, 0x5, 0x1, 0x7, 0x1, 0x81, 0x4, 0x0, 0xddf9, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x143, 0xd9, 0x80000001, 0x4, 0x7, 0x7, 0x8}, r3, 0x1, r0, 0x1) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000380)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x1800000000000000, 0x13c, 0x0, &(0x7f0000000940)="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", 0x0, 0x100}, 0x28) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000140)={'syzkaller0\x00', @remote}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f00000002c0)=r6) r7 = socket$kcm(0x2, 0x2000000000005, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x80000001, 0x100, 0xfffffffffffffff7, 0xfffffffffffff000, 0x0, 0x9, 0x2000, 0x9, 0x1, 0x4, 0x0, 0x2, 0x5, 0x0, 0x2c77, 0x1b8b, 0x1a, 0x3, 0x38d, 0xff, 0x10000, 0x0, 0x7, 0x589, 0x0, 0x7, 0x1000, 0xd, 0x0, 0x7692bfba, 0x3, 0x6, 0x1, 0xfff, 0x9a0, 0x0, 0x0, 0xaf, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x4, 0xa94, 0x1ff, 0x6, 0x3ff, 0xc9, 0x8}, r9, 0x9, r1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2) setsockopt$sock_attach_bpf(r7, 0x84, 0x79, 0x0, 0x8) openat$cgroup_ro(r4, &(0x7f0000000a80)='memory.events\x00u\x97\x02|\xdbi\xf4P+\xd1\xee\xeb\xee!\xe5\x05\xcd\x15\x03+\xd6\xc3\xb9\x12\')\'%\xf3,,Q\rIYF.\x90\x17<\x11\x14s\x02L\x10\xfd!\xf1\x11\t\xab{(1\xe0\x85G\xeb\xb2[\xb5\x82\xa8\x96\xca&;\xeen\x9f;@\xf6\xae\xd9\xf3\xf2\x80\xcf\x15\xd8\x97e\xe5\xa0bb\xc7\x11\xca\xd9\xf8\xd3OGq\xdd%\x99+M\xf0\x01\\O\x11AF\x91\x82\x82\xf2\x99\xaa\x1a\xa5\xb1\xfbq\x8f7\xc4\xea\xe5\f\xdaU\x97\xc0*\'\xc2q\x15\x97\xf6PW\xba\xd2\xf1\xa3\r\ap\xec\xd2^\x12P\x90A!\xe1\xf2\xd2\x1e\xe2g\b\xdbb\fi\x1af\x11Vk\xa0M\xcda\x0e\xc5\xcb[\xec\xd5\xee\xf0]S~\x19ef\xb8\x04\x92\x1b\xcdFd\xc2\x1f\x85\xdf^?r[\x94\xe6\"\bROgB\x16\xcc7\x99(F\xbc\xe8F\xe3\x03\xd3\x1fKr\xa5`+:;\xf9i\xe8$8gt)\xa2\xaam\x81\x0f\xdb\a\xf9\xf9&', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000440)={0x7, 0x70, 0x0, 0x8, 0x1f, 0x2, 0x0, 0x0, 0x2c000, 0x0, 0x0, 0xfff, 0x6, 0x3e17, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, 0x40, 0x7fff, 0x1f5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100)}, 0x8901, 0x0, 0x8001, 0x3, 0x9, 0x0, 0xd15}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 03:38:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x1001, @ipv4=@multicast1=0xfeff0000}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 1590.627837][ T820] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1590.665723][ T820] openvswitch: netlink: Key type 4097 is out of range max 29 03:38:14 executing program 2: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c", 0x4d, 0x1c0}]) [ 1590.732786][ T827] openvswitch: netlink: Key type 4097 is out of range max 29 03:38:14 executing program 3: syz_read_part_table(0x14000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07000000000000000000000000000000004b53445200000000000000000000000000000000000000000000000000000000000055aa4546492050415254000001005c0000001f1454de000000000100000000000000ff070000000000002200000000000000de07000000000000354806cdf2678c44bbb1c108b899363902000000000000008000000080000000980e897f", 0x9c, 0x1c0}]) [ 1590.786722][ T827] openvswitch: netlink: Key type 4097 is out of range max 29 [ 1593.503956][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1596.540033][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1599.563971][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1602.595867][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1605.626196][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1608.655959][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1611.684870][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1614.713985][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1617.733956][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1620.767850][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1623.793949][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1626.823963][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1629.859678][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1632.884782][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1635.910078][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1638.935978][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1641.963958][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1644.997057][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1648.023955][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1651.060083][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1654.083966][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1657.117831][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1660.143972][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1663.163996][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1666.199978][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1669.233962][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1672.263957][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1675.289776][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1678.313951][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1681.344048][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1684.369775][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1687.393942][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1690.423951][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1693.444058][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1696.464005][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1699.489895][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1702.513958][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1705.543941][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1708.573947][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1711.593950][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1714.614803][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1717.633936][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1720.653939][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1723.673955][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1726.701880][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1729.723936][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1732.753950][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1735.777731][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1738.809546][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1741.833937][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1744.863959][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1747.883941][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1750.903943][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1753.923962][ T804] syz-executor.0(804): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=512 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 1754.134126][ T1043] INFO: task syz-executor.1:807 blocked for more than 143 seconds. [ 1754.142064][ T1043] Not tainted 5.1.0-rc1-next-20190321 #8 [ 1754.163953][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1754.172695][ T1043] syz-executor.1 D28168 807 7618 0x00000004 [ 1754.193940][ T1043] Call Trace: [ 1754.197321][ T1043] __schedule+0x817/0x1cc0 [ 1754.201747][ T1043] ? __sched_text_start+0x8/0x8 [ 1754.239871][ T1043] ? rwsem_down_read_failed+0x1db/0x420 [ 1754.245557][ T1043] ? _raw_spin_unlock_irq+0x28/0x90 [ 1754.250798][ T1043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1754.279848][ T1043] schedule+0x92/0x180 [ 1754.284107][ T1043] rwsem_down_read_failed+0x213/0x420 [ 1754.289535][ T1043] ? __rwsem_down_read_failed_common.part.0+0x80/0x80 [ 1754.339737][ T1043] ? mark_held_locks+0xf0/0xf0 [ 1754.344638][ T1043] call_rwsem_down_read_failed+0x18/0x30 [ 1754.350296][ T1043] down_read+0x49/0x90 [ 1754.381730][ T1043] ? __get_super.part.0+0x203/0x2e0 [ 1754.387043][ T1043] __get_super.part.0+0x203/0x2e0 [ 1754.392084][ T1043] get_super+0x2e/0x50 [ 1754.419880][ T1043] fsync_bdev+0x19/0xd0 [ 1754.424650][ T1043] invalidate_partition+0x36/0x60 [ 1754.429730][ T1043] rescan_partitions+0xef/0xa20 [ 1754.440837][ T1043] __blkdev_reread_part+0x1a2/0x230 [ 1754.447193][ T1043] blkdev_reread_part+0x27/0x40 [ 1754.452077][ T1043] loop_reread_partitions+0x1c/0x40 [ 1754.463481][ T1043] loop_set_status+0xe57/0x1380 [ 1754.468660][ T1043] loop_set_status64+0xc2/0x120 [ 1754.473521][ T1043] ? loop_set_status_old+0x330/0x330 [ 1754.484896][ T1043] ? migrate_swap_stop+0x920/0x920 [ 1754.490062][ T1043] lo_ioctl+0x8fc/0x2150 [ 1754.499525][ T1043] ? tomoyo_domain+0xc5/0x160 [ 1754.505633][ T1043] ? lo_rw_aio+0x1120/0x1120 [ 1754.510244][ T1043] blkdev_ioctl+0xee8/0x1c40 [ 1754.519975][ T1043] ? blkpg_ioctl+0xa90/0xa90 [ 1754.526100][ T1043] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1754.532047][ T1043] ? __fget+0x35a/0x550 [ 1754.544615][ T1043] block_ioctl+0xee/0x130 [ 1754.549011][ T1043] ? blkdev_fallocate+0x410/0x410 [ 1754.559892][ T1043] do_vfs_ioctl+0xd6e/0x1390 [ 1754.564959][ T1043] ? ioctl_preallocate+0x210/0x210 [ 1754.570084][ T1043] ? __fget+0x381/0x550 [ 1754.581685][ T1043] ? ksys_dup3+0x3e0/0x3e0 [ 1754.586425][ T1043] ? do_sys_open+0x31d/0x5d0 [ 1754.591032][ T1043] ? tomoyo_file_ioctl+0x23/0x30 [ 1754.602195][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1754.608786][ T1043] ? security_file_ioctl+0x93/0xc0 [ 1754.619897][ T1043] ksys_ioctl+0xab/0xd0 [ 1754.624476][ T1043] __x64_sys_ioctl+0x73/0xb0 [ 1754.629082][ T1043] do_syscall_64+0x103/0x610 [ 1754.633682][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1754.646036][ T1043] RIP: 0033:0x458077 [ 1754.649960][ T1043] Code: Bad RIP value. [ 1754.657218][ T1043] RSP: 002b:00007f2fbda7a9f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1754.669154][ T1043] RAX: ffffffffffffffda RBX: 00007f2fbda7b6d4 RCX: 0000000000458077 [ 1754.699310][ T1043] RDX: 00007f2fbda7aab0 RSI: 0000000000004c04 RDI: 0000000000000004 [ 1754.717804][ T1043] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1754.737797][ T1043] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 1754.763940][ T1043] R13: 0000000000000003 R14: 0000000000000004 R15: 00000000ffffffff [ 1754.771984][ T1043] INFO: task syz-executor.1:924 blocked for more than 143 seconds. [ 1754.793939][ T1043] Not tainted 5.1.0-rc1-next-20190321 #8 [ 1754.800128][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1754.823959][ T1043] syz-executor.1 D29016 924 7618 0x00000004 [ 1754.830340][ T1043] Call Trace: [ 1754.833650][ T1043] __schedule+0x817/0x1cc0 [ 1754.853984][ T1043] ? __mutex_lock+0x721/0x1310 [ 1754.859006][ T1043] ? __sched_text_start+0x8/0x8 [ 1754.863879][ T1043] schedule+0x92/0x180 [ 1754.878102][ T1043] schedule_preempt_disabled+0x13/0x20 [ 1754.883568][ T1043] __mutex_lock+0x726/0x1310 [ 1754.903947][ T1043] ? __blkdev_get+0x19b/0x1660 [ 1754.908916][ T1043] ? get_gendisk+0xe4/0x380 [ 1754.913434][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 1754.933944][ T1043] ? lock_downgrade+0x880/0x880 [ 1754.939087][ T1043] ? lock_acquire+0x16f/0x3f0 [ 1754.953977][ T1043] ? kasan_check_write+0x14/0x20 [ 1754.958955][ T1043] mutex_lock_nested+0x16/0x20 [ 1754.963722][ T1043] ? mutex_lock_nested+0x16/0x20 [ 1754.969103][ T1043] __blkdev_get+0x19b/0x1660 [ 1754.973708][ T1043] ? __lock_acquire+0x548/0x3fb0 [ 1754.979058][ T1043] ? tomoyo_path_number_perm+0x520/0x520 [ 1754.985011][ T1043] ? blkdev_get_block+0xc0/0xc0 [ 1754.989871][ T1043] ? bd_acquire+0x178/0x2c0 [ 1754.994688][ T1043] blkdev_get+0xc4/0x990 [ 1754.998954][ T1043] ? kasan_check_write+0x14/0x20 [ 1755.004813][ T1043] ? bd_may_claim+0xd0/0xd0 [ 1755.009331][ T1043] ? kasan_check_read+0x11/0x20 [ 1755.014501][ T1043] ? do_raw_spin_unlock+0x57/0x270 [ 1755.019638][ T1043] ? _raw_spin_unlock+0x2d/0x50 [ 1755.024959][ T1043] blkdev_open+0x205/0x290 [ 1755.029537][ T1043] do_dentry_open+0x488/0x1160 [ 1755.035110][ T1043] ? kasan_check_read+0x11/0x20 [ 1755.040406][ T1043] ? bd_acquire+0x2c0/0x2c0 [ 1755.045443][ T1043] ? chown_common+0x5c0/0x5c0 [ 1755.050136][ T1043] ? inode_permission+0xb4/0x570 [ 1755.055414][ T1043] vfs_open+0xa0/0xd0 [ 1755.059409][ T1043] path_openat+0x10e9/0x46e0 [ 1755.064391][ T1043] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1755.070214][ T1043] ? kasan_slab_alloc+0xf/0x20 [ 1755.075426][ T1043] ? kmem_cache_alloc+0x11a/0x6f0 [ 1755.080460][ T1043] ? getname_flags+0xd6/0x5b0 [ 1755.094180][ T1043] ? getname+0x1a/0x20 [ 1755.098286][ T1043] ? do_sys_open+0x2c9/0x5d0 [ 1755.102887][ T1043] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1755.123968][ T1043] ? __alloc_fd+0x430/0x530 [ 1755.128510][ T1043] do_filp_open+0x1a1/0x280 [ 1755.133038][ T1043] ? may_open_dev+0x100/0x100 [ 1755.154007][ T1043] ? kasan_check_read+0x11/0x20 [ 1755.158908][ T1043] ? do_raw_spin_unlock+0x57/0x270 [ 1755.174110][ T1043] ? _raw_spin_unlock+0x2d/0x50 [ 1755.179217][ T1043] ? __alloc_fd+0x430/0x530 [ 1755.183746][ T1043] do_sys_open+0x3fe/0x5d0 [ 1755.203968][ T1043] ? filp_open+0x80/0x80 [ 1755.208284][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1755.223942][ T1043] ? do_syscall_64+0x26/0x610 [ 1755.228637][ T1043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.235034][ T1043] ? do_syscall_64+0x26/0x610 [ 1755.239753][ T1043] __x64_sys_open+0x7e/0xc0 [ 1755.244577][ T1043] do_syscall_64+0x103/0x610 [ 1755.249182][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.255380][ T1043] RIP: 0033:0x4121a1 [ 1755.259287][ T1043] Code: 00 48 8b 00 ba 5b 37 44 00 bf 80 39 44 00 48 85 c0 48 0f 44 c2 48 89 c2 31 c0 e8 9a ee 00 00 48 8b 03 eb 86 e8 20 8e ff ff 53 <48> 81 ec 90 00 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 88 00 [ 1755.279300][ T1043] RSP: 002b:00007f2fbda599f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1755.297665][ T1043] RAX: ffffffffffffffda RBX: 00007f2fbda5a6d4 RCX: 00000000004121a1 [ 1755.325830][ T1043] RDX: 00007f2fbda59baa RSI: 0000000000000002 RDI: 00007f2fbda59ba0 [ 1755.345945][ T1043] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1755.358218][ T1043] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 1755.386723][ T1043] R13: 0000000000000005 R14: 00007f2fbda5a6d4 R15: 00000000ffffffff [ 1755.405952][ T1043] [ 1755.405952][ T1043] Showing all locks held in the system: [ 1755.413730][ T1043] 1 lock held by khungtaskd/1043: [ 1755.427430][ T1043] #0: 000000002210d15b (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1755.455992][ T1043] 1 lock held by udevd/3878: [ 1755.460636][ T1043] 1 lock held by rsyslogd/7485: [ 1755.487798][ T1043] #0: 00000000fa1a0fc5 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1755.498903][ T1043] 2 locks held by getty/7575: [ 1755.503683][ T1043] #0: 00000000e842c0fe (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.538703][ T1043] #1: 00000000cfd6d93a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.558764][ T1043] 2 locks held by getty/7576: [ 1755.563452][ T1043] #0: 000000005a3280de (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.573763][ T1043] #1: 000000009554558f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.610076][ T1043] 2 locks held by getty/7577: [ 1755.615355][ T1043] #0: 0000000031459a09 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.643936][ T1043] #1: 00000000fc2fbfcf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.653553][ T1043] 2 locks held by getty/7578: [ 1755.673933][ T1043] #0: 00000000dba1e695 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.683016][ T1043] #1: 0000000042d5b745 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.713945][ T1043] 2 locks held by getty/7579: [ 1755.718657][ T1043] #0: 0000000089f2db02 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.728096][ T1043] #1: 0000000080b3379d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.738057][ T1043] 2 locks held by getty/7580: [ 1755.742736][ T1043] #0: 00000000c7dbf481 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.752566][ T1043] #1: 000000001a6972dc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.762655][ T1043] 2 locks held by getty/7581: [ 1755.767679][ T1043] #0: 00000000780e7040 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1755.777053][ T1043] #1: 00000000a4e8ec02 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1755.787251][ T1043] 2 locks held by syz-executor.0/804: [ 1755.792640][ T1043] 2 locks held by syz-executor.1/807: [ 1755.798448][ T1043] #0: 0000000004f63a68 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1f/0x40 [ 1755.807982][ T1043] #1: 0000000018316524 (&type->s_umount_key#74){.+.+}, at: __get_super.part.0+0x203/0x2e0 [ 1755.818382][ T1043] 1 lock held by syz-executor.1/924: [ 1755.823693][ T1043] #0: 0000000004f63a68 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x1660 [ 1755.832983][ T1043] [ 1755.843917][ T1043] ============================================= [ 1755.843917][ T1043] [ 1755.852349][ T1043] NMI backtrace for cpu 0 [ 1755.856738][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc1-next-20190321 #8 [ 1755.865318][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.875371][ T1043] Call Trace: [ 1755.878666][ T1043] dump_stack+0x172/0x1f0 [ 1755.883026][ T1043] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1755.888316][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1755.893966][ T1043] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1755.900479][ T1043] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1755.906379][ T1043] watchdog+0x9b7/0xec0 [ 1755.910572][ T1043] kthread+0x357/0x430 [ 1755.914643][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 1755.920190][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1755.926567][ T1043] ret_from_fork+0x3a/0x50 [ 1755.931508][ T1043] Sending NMI from CPU 0 to CPUs 1: [ 1755.937342][ C1] NMI backtrace for cpu 1 [ 1755.937350][ C1] CPU: 1 PID: 8090 Comm: kworker/u4:1 Not tainted 5.1.0-rc1-next-20190321 #8 [ 1755.937356][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.937360][ C1] Workqueue: bat_events batadv_nc_worker [ 1755.937367][ C1] RIP: 0010:lock_release+0x44d/0xa00 [ 1755.937379][ C1] Code: ff 4c 89 85 70 ff ff ff e8 d0 18 51 00 4c 8b 85 70 ff ff ff 45 3b a0 78 08 00 00 0f 85 89 02 00 00 65 4c 8b 24 25 00 ee 01 00 <49> 8d bc 24 7c 08 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 [ 1755.937383][ C1] RSP: 0018:ffff88805ab6fba0 EFLAGS: 00000046 [ 1755.937391][ C1] RAX: dffffc0000000000 RBX: 1ffff1100b56df7a RCX: 1ffff1100b350166 [ 1755.937396][ C1] RDX: 0000000000000002 RSI: 1ffff1100b350172 RDI: ffff888059a80b30 [ 1755.937402][ C1] RBP: ffff88805ab6fc58 R08: ffff888059a802c0 R09: 0000000000000003 [ 1755.937407][ C1] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: ffff888059a802c0 [ 1755.937412][ C1] R13: ffffffff86f56e3f R14: ffffffff8a5cda20 R15: ffff88805ab6fc30 [ 1755.937418][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1755.937422][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1755.937428][ C1] CR2: 000000000045804d CR3: 00000000a4e79000 CR4: 00000000001406e0 [ 1755.937433][ C1] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 1755.937438][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1755.937441][ C1] Call Trace: [ 1755.937445][ C1] ? __local_bh_enable_ip+0x15a/0x270 [ 1755.937449][ C1] ? lock_downgrade+0x880/0x880 [ 1755.937453][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1755.937462][ C1] ? kasan_check_read+0x11/0x20 [ 1755.937467][ C1] batadv_nc_process_nc_paths.part.0+0x276/0x3c0 [ 1755.937471][ C1] ? batadv_nc_to_purge_nc_path_decoding+0x160/0x160 [ 1755.937475][ C1] batadv_nc_worker+0x5e4/0x760 [ 1755.937479][ C1] process_one_work+0x98e/0x1790 [ 1755.937483][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1755.937487][ C1] ? lock_acquire+0x16f/0x3f0 [ 1755.937490][ C1] worker_thread+0x98/0xe40 [ 1755.937494][ C1] ? trace_hardirqs_on+0x67/0x230 [ 1755.937497][ C1] kthread+0x357/0x430 [ 1755.937501][ C1] ? process_one_work+0x1790/0x1790 [ 1755.937506][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1755.937509][ C1] ret_from_fork+0x3a/0x50 [ 1755.939822][ T1043] Kernel panic - not syncing: hung_task: blocked tasks [ 1756.174639][ T1043] CPU: 0 PID: 1043 Comm: khungtaskd Not tainted 5.1.0-rc1-next-20190321 #8 [ 1756.183215][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1756.193265][ T1043] Call Trace: [ 1756.196568][ T1043] dump_stack+0x172/0x1f0 [ 1756.200970][ T1043] panic+0x2cb/0x65c [ 1756.204874][ T1043] ? __warn_printk+0xf3/0xf3 [ 1756.209467][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1756.215129][ T1043] ? ___preempt_schedule+0x16/0x18 [ 1756.220250][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1756.226445][ T1043] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 1756.232635][ T1043] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 1756.238854][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1756.245039][ T1043] watchdog+0x9c8/0xec0 [ 1756.249219][ T1043] kthread+0x357/0x430 [ 1756.253293][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 1756.258842][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1756.265121][ T1043] ret_from_fork+0x3a/0x50 [ 1756.270609][ T1043] Kernel Offset: disabled [ 1756.274940][ T1043] Rebooting in 86400 seconds..