{r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfe80}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 487.651419][T24465] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 487.715523][T24465] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 19:20:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x24, r2, 0x429, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) 19:20:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x40c00, 0x0) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=@ipv4_newroute={0x74, 0x18, 0x400, 0x70bd28, 0x25dfdbfd, {0x2, 0x0, 0x20, 0xff, 0xfd, 0x1, 0xc8, 0x1, 0x400}, [@RTA_METRICS={0x0, 0x8, 0x0, 0x1, "9b7415"}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_OPTS={0x0, 0x8, @LWTUNNEL_IP_OPTS_GENEVE={0x0, 0x1, 0x0, 0x1, @LWTUNNEL_IP_OPT_GENEVE_CLASS={0x0, 0x1, 0x5}}}}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}, @RTA_MARK={0x8, 0x10, 0x81}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_METRICS={0x29, 0x8, 0x0, 0x1, "8082a9cb178eb2a45759fa01cb539eb9b2e8f7f00c7e2c2c96311997c8ac4bfdeeff17dad7"}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x5c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f00000004c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000006a40)={&(0x7f0000006940)={0xf4, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x5}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x1}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x1}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000180}, 0x20001000) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100766c616e000000001c0002800600010000030000040003800c000200100000000100000008000500", @ANYRES32=r3, @ANYBLOB="16f2cdcbec57ad470000000000001fdeb170992a7835ffed385559790230e4468d8ed61e068b1215cca1ac6f3758fd0f6d48b5886dd0950c381930b5784a8917401c8e1bf7ee9f09f9314e4e7c50ceae411cb488b18f7a064f1873be714c09a745abbf779c2cdb280d8d2a4f5d239d0f39cf03137905975caa97af306736416da3c74237bbfb121f687306a552f9a96af1885c928c7c92fcc14c6704e7f3eb8f92df948ed979bf68efff62138ff7be344cc9720140d57b7a7883011c65d7ff39f545b7274e21407f76209780178ff54927d443448e7e0d526d4ca7ae688ee0aa36b2d9cc76cebe", @ANYRES32=r9, @ANYBLOB], 0x5c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x8, 0x7ed2, 0x75b, 0x200, r1, 0x5, '\x00', r3, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000011c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9806"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) 19:20:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x3, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x1052, 0xffffffffffffffff, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000480)={r0, &(0x7f0000000380)="5ba507e3fc2d52425960fbaf383ec55c1cd706dcbc4a88d3428830ee25ba67df90d4261dfdaafe533049aca16b9d9feaada06ac09219c6da2f2a96c7853ab9561be0cdb9", &(0x7f0000000400)=""/81}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb509e092073508a9126653327010018000000000000003c0000003c000000030000000e000000010000040500000002000000000000000500000007000000020000851f0000000a00000002000000000000200d0000000500000019000000802e004f3918f0191e5e2093b3788cc6415c541dcb82a69977f29b8a61138eec5e1946cd2e2b5f513f03b0f555faef49d52cfb7bf658284d1a"], &(0x7f0000000080)=""/68, 0x57, 0x44, 0x1}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000280)="76eb9f069818943b829de9085e88076358bcda0a88bb099762172e9b8b849c6264a3ac30c01f09e49da5e0377fcbb7099a90a39757ef68e0a8e644d4218f78fb76bef426c970a2d764aefad9e1d908c9cef08842e39aafaba91dedcff129af43c828b28a24d226d8df2fe7ed9647c5b7c007c0e1de2e5e52a0bb9efa41f08617e8a2ef9be4623930c03474d813d3f44d9c181e04434ee619ebe8b957198dd9bfb6ec9b444c52e7e01673a27f1fcedf1fe2bccbc78f56d661f1fa2c099d24cd334cc21d5dbea2f07bee4ae7d57a248cd777b1f4d1d75ceb568fba03f0b1fd3219e06a61e6f6109cb5543e4331a87674d8", &(0x7f0000000000)=@tcp6, 0x2}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfec0}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xff00}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000c0}, 0xc, &(0x7f0000000080)={&(0x7f0000001200)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x20000000) 19:20:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40082, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@ipv4={""/10, ""/2, @multicast2}, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x16, 0x7, 0x8, 0xfff, 0x40, r1, 0x2, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 488.228434][T24505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:34 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000100)) [ 488.312708][T24509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4a2ba6e354cb201f}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r1, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xffffffff}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x40080c0}, 0x48000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, 0x4, 0xa, 0x401, 0x0, 0x0, {0x8, 0x0, 0xa}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000017}, 0x40f0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003700)={0xffffffffffffffff, 0xc0, &(0x7f0000003640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003500)=0x80000000, 0x0, 0x0, 0x0, &(0x7f0000003540)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000003580)={0x1, 0x2, 0xc6c, 0x101}, &(0x7f00000035c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=0x9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000003740)={0x5, 0x1, &(0x7f00000033c0)=@raw=[@alu={0x7, 0x1, 0x4, 0x9, 0xb, 0xffffffffffffffff, 0xffffffffffffffff}], &(0x7f0000003400)='GPL\x00', 0x10001, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000003480)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000034c0)={0x4, 0x10, 0x9, 0x3}, 0x10, r1}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003440)={0x80ffff, 0x0}, 0xfe93) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x9, 0x4, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa32d}, [@generic={0xc1, 0x4, 0x8, 0x0, 0x9}]}, &(0x7f0000000640)='syzkaller\x00', 0xfffff801, 0x69, &(0x7f0000000680)=""/105, 0x41000, 0xc, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000700)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x7, 0x200, 0x3}, 0x10, r4, r5}, 0x78) r6 = accept4$rose(r2, 0x0, &(0x7f0000000300), 0x80800) r7 = openat$cgroup_ro(r2, &(0x7f0000000500)='cgroup.controllers\x00', 0x0, 0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000031c0), 0x4100, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000003200)=0x0, &(0x7f0000003240)=0x4) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003340)={&(0x7f0000003280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xb, [@func={0x1, 0x0, 0x0, 0xc, 0x2}, @volatile={0xc, 0x0, 0x0, 0x9, 0x2}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @const={0x3, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e, 0x30, 0x30, 0x61, 0x2e]}}, &(0x7f0000003300)=""/43, 0x53, 0x2b, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000003380)={0x0, 0x6, 0x6, 0x80, 0x200, r8, 0x7fff, '\x00', r9, r10, 0x5, 0x2, 0x5}, 0x40) io_submit(0x0, 0x3, &(0x7f00000005c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000340)="2143f02ae187abb5c1358d95f80327d493ffdb07ed92628dce25cae45c0430de58abbcc855a0dd3a324c4efc57b72c73844cffc9c154b574a38320408660950e9d0e47ae8a52", 0x46, 0x18f, 0x0, 0x1, r2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xc, 0x2, r0, &(0x7f0000000400)="82ac501ce86bd495eea52f2acce5f70c285222d6faffd5e420a4625592e6886e3dd560bccf35f53e81bae35917b3aec9e29f5521f1ff7c8e3e0e5a7f12dff61f5a2bb43eb0066955a8d6e0d780e67bc2204e3f07b5cccbbcd2fea8f5ac349178cd7bf903620f33a169a961d45bfd70594f2e5ef6d4b43ce3882ff41bb615db235197955ea2ad68052fafa58750e216f16f82bfe817dfa5f8720f71fef60f76df740243ce7895b4e17697d390bb20772f4922f857a21311656162f475b894e20bc20def4e6e3042ae6010635b44280a01fcc6c6a6063c394216f129", 0xdb, 0x401, 0x0, 0x1, r7}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x8, r2, &(0x7f00000011c0)="c9d57b02ce1c47a253d8734281b5dc935ff593c1639488a263132ba35549667c998c0192b59a3e835571d925c9afeab0ae17b93fac0bd7fcfe112244983b5f0d5eaa276fa4f465ee5e5fba4061bd972ceceb709a8920ad42d42a4edf487e75ad5260e05cb9b04ac8c34af791e245a55f05fb7eca04b27b552c57f3e2eee0a693f7470c4cfba771b30bfd15419b4f92cb265b69babdeb482aa4d62da1a1c11c2e1944e0cb87ae940caf3ccb110c9268b4cb5049a2dd08df0a45d233750c52d42188cfa4008d3dccd4bfc331545c9f09630ed516cd3128ffe89771090101f09e38a1eafb25bd346d9a8c10fa4cbfdf9db329c67f322b19c3cbf1dd091818d674afd18e2e5b553b5bf2ea5a089df32e981c847aaf6a8c1a57cf6ad8c6b7fcd86e2b35a83db85d93ecd135a9ebd4086ff885114bfa7614ccf96353592069d12a558506a04dbda299d8b37faa623f2d0310f4fc04d9523c8aeb7116b181903b61937c4d914dc62d6fa91c80a98a0aae7d74b42e0d443a736d5e14ab63a01882e2c1349d1356fddce4a99ab0570b3292f44afb3bcd28e4cce22233d45a3d1cf6681b4e9e25035f67f17cc0f820d03103b1f5be97c3a6b527851eed5cde9bc1e6c1cf4c3dfb446458f3e4035bdc679118babada5038752b516f54bd4341821a6b3b4402d61d4714c4419fdf5c99b5d77996a47faf39bd8be0ddac9de4af0851efd3f003158cbaf4ebc0fccf8dfecd578749182310e1f18a9f7e455defb121afa32f68da3376a4ead71224fab3a1f55a51049c007a9e9d1d851ae5c97e336d73ba90253ab744ae53e62a4933e94c31707eeaed46a61a47fec6d680d7d8271c88584218daca7706a76f832d3e4a8af3034617f4f271e052b05bb6120c2fab4cdf5415f90d402fa0f9d5b2f0b385858969c86c93704b57530309b3e0a7acd29ca46df202a9a6633dccd832d180938f9a9fd98e9507390fbf8d7f143451ea47ff18b0795e481f781f6065714de238536f7e078b21d447bbc54916d449105a4fbe5572be4db2215d8571d2c2235fba58821e6afe076b5d40d704000c6b44b58a3b569995c4bec48f05453a75ea5bdaafc115e45888bc535e2e98fdcbca41a1c174d9aa5b6aa1f3b5e27fc76b52042021057e4eac9276b04943d512d6fbbc6cbca2f64af03d3eea75c45a52f3b572d979802d5258444f003677d96da9f63a11f2654a46f39abed4d4759d3922c96a32e1c410b7f05f9c5479e293c2c65397171042f0dcb443299baf98b043478747b61b7f554f4d9a0b593aa6b4c5ce16440ca5ee5a941df299109914f69ce16760520e11caa77de7fead80b57957c3a4e8321420d6006c0be29886d6edfc2931b4fa7552ae96242d8d5663b393cdc385f946d86cf160c9c0bfe89db9a22dc06ef9686681514abcba89804a425153f4f5f8b9f8757986854da690619f3ef67ccd646486bb3e088f535c816b452cca596247397671a7d7b3a5c5b898c2878be1ce261e09528c936535bbda68e034ef1c289546a23b71ba93ae6993f75e0716b2b6575621941c8cef70ec78a801a538fe909a21e2cb7000435c5adbbb2a639969788439de4aec945f16aba0c65f141b7e7fb81c5491683f1fca9212f863baa6e7c106380c6b93f478b4bec838cc1ecb2911067b248e3ae675875150078d8cdf0e02ff903e166d44826398b35897dbcc1cb940876f97690cc058b176b42824fd8402ee72251866eef55f7cc3eb3731a40e36605f4755a6c38f326dbcf75d8846bd770b7ecf42345df3390b173ba0c2560e671bcb050aef434d6561ecbd171a842575888754984f081c8c87b550ee1f532aceb8ab649e6cb866d872d5a1ccaa9e183b9a9aa8f47833f988ec817de2d95bd4f22975dd5fc54be11757195fdab3f6137ce3eec9c1a570c1ff0ca96bfc5e1482f66be291782db251ae357c7ded3c1a23596a49e2f8afc98900b0b80a54272e64aa1a45aeb7f447ff010a60834627806e83a0d922d3e014d2967bdb56ce7691a1a42dc2db02b68431b79e348c931e11819beb80fc52e1932bc48888c8e1fa36d54913f2f5895d60df41376d29f5d1fd9687ec214c7f4f5a6b5cac2a5948eaeb501b19ffb415f41a311ffa2c5c9c7b792c56ed7bdf9ca4f35d9b8ba863ab22575c0183b16d29d7514f8d4aa42c313da4bd6eba29ddcfb16d2b4c13e1a2376edd280da79da72b99bc13fe250d8b3eeb4884dec82dfd123490e5f42ed68834996e2411827306995541f3b8708a3a200f99cacd5a90f72ea982056a97a15bb12ea8ec0b36dc6442472abd688f6e48aaf2dbe1e65af19dd080bd06ad30a1c1a9b8957d6a92e1ba8acf636e4eb8487b92df09fd8ac823983a4b597dbbdb7341b73543a904c94215938d73c33c2a723a5de42847f9fa4e57f78fa6f41e2f463532cb1ca11bbdce4b6d5325ef85a044b32b7b64af5982f23ce21ebc778ae2fecc3d114f7d4fa340b3b4bf6e25fe6fa58e13eed2ac5754256a480a6dcfefe833f97a68a48b33d2110a1983197bafeb9336ef8a31595c92c2c7da6e59b5e841a23c07fe5a5efdf629c147db72c5dcc2c809c735f3e0177fcdb60d198e1b90c11045bde2fa7ee53e0f82a4d5c4c253b02533117a57e52f8f51b63bf7497bfecfac2bfd761e01e599609ae672f7e8665655b87635531e75928a74b34b63b7441de05c67fe1da99991be900988e7957982d16d6b48d1d118043ad533bdc9ec5bcf362a54edb4fb2600a5825d852c71d4d53a4df5ae48bf8cf39203ba044f72d0e5956f9872671fb2dc8bc685aae054299aac34714cee760c65a0c6fb36dc259f3dab98da59df0eca9e30aa312a1dbe81eb6544f4be7fd31d29c61393c99204a0dac57304a49076d91a302820cc3c246e2374c6188be94077b3ce63ebadaedd0337b4743126607a6d4e884c243b4e9aed556a970d0494e14a1f43a910a147ce72061c10f4b3850ff91634e3ab284aae16bd1eacc0370e516b601dac2798335f4efc14d15668d75969e0fc7b8d8d47d6c5a3fbde69a2348dbc0f762f4c549d43fb48f98d27545e60c5133ab50d6f5f62dc52a91e47b082fc72c78fd1c59a6edbc34f0b0607d96ce2538b0bd42b74b0815de60a563aeeb88256b6f8d42cdf8b96097631eb7b9d9a54f56857d54be5c1b7023e2e406274544d7aa4795c4642b08e84cb5b56ed07c95908ee202a965fa42adde8b93d77e4566ad7ed366bf58ba7d999f52c1d793767839c603e59a1078dce2f131423582deb8a70287128b8c6c15a54b559a792352d05fe45ff3bb6119c337e47ebdfef95d6b9fd5f8b6a6ae1b2d97ceb21a8a95d82e4858bd2f8687fc6453e17952fffc65fdc631f817ded18f83a964ab6981465c341237d6b372f4013e34be132045c87c233ec2ba8d7e9e6422f1767df03dcc3003283e5d0bd0bbe197a06c451c0c31a3475e093c947cf9c8bef24ed976701422f673a824a33a6895cc28ce9831d815ebe9b72a54147cb74efaf51091108cd58f09d1bb651df4723c8f2ed5f2fa721cfbc10e780dd0a20af9d06d5e29a963e7f1deddf393583e52dd829115638c79ebed8e25e43c353e75f4b00fa14130e2b2cdf7d6b7d7094f121fd7caed44222ccc2f7f4762f63f95ef0795db3c482ac95bf4c9e66fceef6d2981bebf401e9cbf381ab3a6b9e0cfa7292363c7129dfc639cfa4a0582e09bd94889f34c4e22f166628309f0d4b9f66c1fa846720038b99d38f3c39f79447a24a2a3d665d0b10ce24fea53af5f1e057e4de1e161bff55642abc0230817478cc123781308481ffec0871a54b51c78fe15f528d8c8122d4457348292d8c15767470194aa1ac4299589e10939ac8582e71cbdae9abbfa0bad98558b8287c6f20cfd4134ab5524de87baa01e5acad92e69d33e566c33be7ed56fb7f2f81232136eb7a7f1279587e01e246c07b8fb56e0afa1e54099b781c5d3fa10aa02b6d6917eec898e1a8e6046a4dfde3ae363464519c747db806f2dfc0bebf6717ec5cce04afdf1fa87c9be204e420ea0dc643e05935398227a0b65057d6d2bddab3288bc9a35916bd14252a6657aa903a7b8e8f9aff483c613929f100a94dcdaccdff4ca5406d4ec9b37b3427e4c7bf1aad6168bcff680b84921cb7b2a3035204a380f42d976881119c5e06df45f9007600900ddee2aec411fe1ba629a9498a552bd624bff8602698cba31651d30cd3258d4d0d92648d6853e0eb63daaebd6151b617348f5eb2dfbd358cf2a41761488ca45324460ab51742621d3150c43eab3369927d50f15b4c5f6c888ca7b07030f51015ed690587056f3666f0e602247528b611ffa2b1847b169585fb39df9e60a613d0afb1e362b74733b2f80d38a5ed81c9ed864399c03c6fa6662287e18d7c77fe6c3ad9255f7c257d5f367842643ed7edff78643e6311ab38f6ee17f695aa9f38f6ecdfb103a417b828383891838a0ea5f8fe238b2146b8100d6b13cc6c44c223fc63450331e7ac7c78fde0bda4135d81aa505f8f9884f679930582a624ae8d70428cee9f2a9ebd83c53ecc18159da1ce2f99ca736b4ef8d5e04bbc90d179296377758b81f2e58eb8cf2fb02563490d1d2194afdc8ecacfb1ecfc31ffad629c46a8f88b733cd0f6d835e256ced463780d18ccf158423747c7e41d1d5836e4f68531225eaf44e8d8e08e5cd21bf99a5e81258b62da1fd2a71c7900488412b810f10e40716e8b6e26d53540d5bf3757882282f17e85f7ad6d99809a73b7398b9a2e5cd323767e2600aa8d53788361bdfe9b20a32553a572f67efc6018be03e0ce8d5c097382936cad2455542eb80136d50da20edba749e44dfdbd9385357531c043094a9b9708d94cabf0cd2ad33383311ef101132523d963475e7ce201a7b1daa06104859812bf24acc9ebdc5463ff62b5fb0b3048b6e8b2e3ad2c9676a84f192f5ec99913afcc8722c6e1f50a5e7e4628af1cb6f8d0bb9809ecf61377e47ef66f85de9418e8135ceb689ea03551b2061c3bd690f3f54e6d54de142750cf4a63081af7ae9f1c5335636e0dc667e38c0fccaaf01abfd6dcb37cf6e030deef1f27ab8eb8f0ef4273b3937f54af06e6646e28259e9f234d48a4b2c7da573608c3fbdc47c8fb349d39108acad15fb2626df42dacacc47fc3de9388373503e9b356cd138889a8ad5915a85d6fe2633d342c97e08dfebbf7fda90132208f33cd18a849a6bd53f23e5f9018fff5cacb2b23f6fbadc94ce35bd3787fb2cd77afb74fab829e59cb2672a14957c27ed7bf46407f9eda19c642e8a9bdf81b9be0e272fe033858a2dbbd33edcda0db1be6be1900b6f4112d8154ba5968dd948ddaad624e20a1438cf520e7df7d381006cdb4b78b42ffa1bfe46d2d9cde8cf0f1ea44c4e3de2249a92975ba92b3d13392ab2d3cee701993a2e56b19ed152816af2b9e97e10cf0864235720da5649583aca6059427fc3c493f3d957fba12249f90b0535d6982ab1721b012dbf44321d9941ea92b9980d114a838213d6be501f4a7e82a959659f2254f0b5c08679cbe22e50950fc8411d7f39fea63c77f0131225eb76776f6451ea521ff6d4666237f3773f54f6b24a0cbcc973cd9e9ebcc2a9899698205b6be255880ecc36182d4230d0546fa10744d46a3417f1fcce498c853239796c3270f0cfbe48c49d55457e24d6fc999e3a8d411da677d8206183acb5d6ea01c334bc1f9fe5bc8195d94a613cd62b8ade1e6803f93449f1a43c143c4978de9cf5b6965e361a5447d7fedc08a55dbce3fa8c445941e54d9722ca345967f5f28", 0x1000, 0x8001, 0x0, 0x1, r2}]) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @alu={0x7, 0x0, 0xb, 0x9, 0x1, 0x1, 0x10}, @ldst={0x2, 0x0, 0x0, 0x3, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0xa6, &(0x7f00000001c0)=""/166, 0x41100, 0xa, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f00000000c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0xf, 0x10000, 0x1}, 0x10, 0x123ae}, 0x78) 19:20:35 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000840)=[{0x0}, {&(0x7f00000002c0)='y', 0x1}], 0x2}, 0x0) 19:20:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x6b18, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f00000031c0)="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", &(0x7f0000000340)=""/51}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000011c0)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x6, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @exit, @alu={0x7, 0x0, 0x1, 0x7, 0x6, 0x50, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x0, 0x8a, &(0x7f00000001c0)=""/138, 0x41100, 0x8, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0xd, 0x4, 0x100}, 0x10, r1}, 0x78) 19:20:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x40000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:35 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed, 0x400, 0x1}, 0xe) 19:20:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000140)={&(0x7f0000000300)="60cb6f87f2a2fd16b423b07f893de0f9819d962e982964471754abf7d1ce1d6cca6f84f2bacc52f95f6597b22e7a3a613c50476eba6f64d7cdd8d3705274614f456edf16e3811cdfdb01b4ecfe92bd66c1033f830a72b9f058dea3038cde6667eb0972a8468b3e8a7db79749f34d76752163cc4bba87b325d3fb72387d81ca60d625e1e0b5bf7e4c74cd165b46c1c638b6922ac9984858066cbc2d7b4f4d1d5cb1df36584ad53350fbc3e146e127b7ecd9e659cd317f034922f6721856ffbbcdde07b0e59d271a83b3c9fcb4671992676484e84c6b3d1fcb742fd720035dc629001a", &(0x7f0000000400)=""/84, &(0x7f00000011c0)="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", &(0x7f00000031c0)="fc4e32b270c3a3470b18bc21897cb7a3882708381fb7eb3b0a0d0d8d42e189f2c40acee71f61ce89901ce94c81b85f94237dce46c066b599d1d81127ccfed114989f36ef3ff961c4d40e5dea206a969d641387e3a05417c80ee43eff54ebdc15342b4bac0c981a2b215f6d5ddbdde0c0d6b92f886ead5e459ea5705289afcb672ad27ae016e17e797e562d21163b7b9e98506f8d8aab8ff0669a991cde9cc3ba4cd34e71636746fa5b0863d604b69028da0bdc917dda58aba90a336278697ce2634f5bc94c03a6721aafc4dd8a8011a9a011c966ea757e47f33fe2f82555f92205ba98bb6c55f25eba8c42312b528f908917bb2739b4598649008f2bd53048cbb23b0193f0fa31c47808e8715eba29e6556c5720913259d04eab59b20afd11b3b437ea1302740dc4e824aab8f7752b439f4be06dc7f142706a17edbb9f9ef09d60587d20f9b8e14b4308f901170dc4b9f162c0eb43275e8146b603a8abf33d8005a2dcc3c279b518b6b1b564457c9c69eaba07f4dbe263323d008c6638b457fed1c9b1023716c4d7d103aeb1498755d7c7c0f1312ac23a5c0ed0991906fd833d6a516a08f13465a42eaebacb9a70bba66e188a91327f179dfc49661d4936e49c2a610957c4c5a229d57ea7b7728ea6d744c9a7ee85f23ae94625e41301889c24e32fd89cd722e88fefd60482a414de70aa483e424cc155aa43bde4a8040e3fc01bdcbb1572ea53638526ef16377f40bf4b6fac266c0925dfd4d4fc104b9da0a1979e8a51b672b04ac50288582f954ed190a614141e6bf8ccee4f26c5c37222e03f9722f01e6748d6170d22f0462407b28c10f5e2f97a8af395766457fb148bc007241431afe66f6a9a03d88d246396c5a70ddbfc7aaeb4bf26c43ef845cf6e6174b9a22756a96cf44f264c0d1e97487a7ca00f7169edb095b0e22b7baf1b9bed77feaf302a8c870e6b6bbab9849d9ae751f2340a5d08fd73896cad0eb77785efd1bac4972a4dab39fc69a642fa29f6ba565ae97705220a40cf45d031673df6d1a9beaabdd0046bb9407347fb4f7c26347552bd624867124e2988f3e21f67ce2a43f8baa2aa92bcb0b3a694e85f94361acbf86e38efca95fc6eb988677fb362a30ea639f929137b408f99b287905d4741b3610575c634baa48aa8faadae28b7548b2861806910c9b359318052175203acf7fabf5ca577ed92d7a738f8218fefb9ee8ea4e5dc2b3f03fc7de8c31225fbe12d5f44a56308b6bd15f3b5e28a36174bfd9221dd7088729de3d07c366e71120dad55266a18991ad70c3de1ecac0e34a8d2f9c1092a4a38f39da9e4428873d48d4f38e9f357890dcdc56f1466adc11da08a2db5f6831221b4253fd1f38a54e06faad9af9f7a8d7fe83988cfdef65228c883075c208ec9fadb447ef619b8bc15bd919aefd57f0a607a89d98d4df8d2ba9185df5bae96ad0c40fce4548d52da0e3d43ce8aec21c12fb8f919c4dd1e4331607bd55032fe91f46a7a1570faf6268aa66db594beeb64fcc26574acb30f2c822a708bfedd97aec4a97a8e2a9fc28c99629cc96bad42bfbb0d713dd9856057121e88b3103247f8db72b8c6bd7077614e3a299ab411ee010b13d7f88d3360b2c69280b8b0fb1814537cbf9e4ce578d907a7f111a64049695461ed0a953fa9905252a5d04544d1606f32e52f2d2710b3c1c1b9c8dbbb84b53dce690200df571334dcb2646998d9c7f3a7d09dfc38c94386c5ae662930a438d24778643717c2f9b655284c010549e682cf0e8695ee753ecca5689379c50e3e5faabe6ff9a63454aa8dbc41cb1a610619cce6439311ea93ba0b83bae9b8b7932095adaaf20c05d8cae0f80766b439ccfa2c22a05bbf0714fd88bb654d555509d2c4af4a47d838ecf73464187364c3571d3c36ad6ffb303561f77d2eed4644aafdee326d71490791b7dd5a566c1540ff6f6eb40525381a9771de17f7ebfffcdcf5492c412e3d23da055de16293de246a419bac8a801d90a7f479f4852d7630d3b8dd24ba4cfa0d2f2d93d053921051131dae926e5cad92ac3c4a4d642ceabcbef247d91e274fb6006daf4f5eadb8e6c3b8394b52c5130452f5623bf60acda19084099b8680876ee18f8457d0449ab817d6b618f59aa588d50663aa4eb7199e63be8e0cf07241fdaae79f9e299da40f4632fd53a2b2811a09e2f9c5a63423a36ed4de3bfaa940d30833453939b06dcbd94745d47f9e7d60e64874baa7a7e042b9b434b4f27f521130dd818f1786db1f4fe51642a564ff944eaa89cf54edf36f24d1a716c3fa68ceeac7e7d6d9dd84f351ebfad287fbc42415cffaace5428dd670b8698778e3447c4bf8edb46729ea91f1476f5e9d3c2463ae80721375217f42212da70f593d8f4a12d26505f263c525f47d326c4e590e87a692c95d3b01d5cf0c208feb6cf3bc04a5cbc5fd5d9773e39731ab0d978e9fb0053a964a036f9cbaf2d69032d98525c5cbe4751aebf123e1f50d44a7e76cf86075888095fe108e040d78c4c0ae354436db28ab33f093887a0e95a3bd3a1883f5be6ba1677ae421594d149cff548209954ee5945d2f3e0eea9716a57c373273845acde2ac636955a69d21c0aa0c966176163b71c1bcacf1c7c488c3ba49e0f491ddd5451409dd941a7efaa4863c4c99543edb66cb9a6e4ef988f0b7eba9d5e5fc89f64aa1c091951714e798a4c593009deef6c702129a7b5ad19cdb0ae337ea5979d4b35201bd7ff363b5f6baa57575105be3e58a87dae5d6605d63547f556dc5ab0a4f93f239a86f22e3af9fde98609f3e84ed1fc95041d43f7ad59411a50e547683e2bce85c9450d8e05ded3bd5b27ab5631bf9dee29407fc8d831ab3f616cdba44d9fb486221f699d231fff3e279288d0959d4270f61a122bb0b321c5cc7f07325751060da4f466d556fc1e589cf83626ebbff1532cbe4128760eec568865b8bb1218a68fce09f6fa0b12bfcbfa05413de24b2f0fe226d7d5339b544b21f367d7ae5c078d64b54855294b42d8bdd9f787c746eb2adedda4d7c4e4738be66a23638a10cffbd12bdce662bb195eaa9ed30cf3083522e5d6e5f5abc184342f4e6e563b16ea9f2dc350e0550cd8935481a36fb63cbd8dcdcced97af89c1ea50ac4bbe5b239787a4a09a70874274fe724588c93e12970762cf95b1cb6379aa3bd766e3930d2625627b28da8024d7855215a4c64374ae6d3ee8597483ffb2a603860fa2877911b5d24b534a39cdd584241299f1f4acb5e0d871673cb3f8058026a20ba576694d5fdde6dc2b1a77826d9606cbb3822d2a7d4bee6771962064f853ad5bef9b8bf6fb1edbdbba3ba3974eb2e514000cb0d7c8bddd5acb4489997f41f16dd947423c27f0330e54114e8eb89e9fa5f28aed553005059ea2910cfccb0819c0b19e3ee53d3063aefe97ca3c94254b588ca96d04b0ea8aad373e363e3086e03ba127b93eda7d5fb8f1f04c8aea4b90b2156246d1b9ab9a0bdd2c09aad7ec625f07b106ca86cf75bc97d0135e8b8f9499f21b04da8c773d2f95ef31dfd34e4ad4fd735a1bb058e41e0f3c17bca9b40ac6d363b426ddeb0f94e68b2e58562af9b2e00b6380765c6513b8e02e5709f719443dfb3fe6c0033851397f81c32c608ed33efb23c05067daafa236b1d19b9a2a9a4a7772fe517d21de89746b81d342dd7f09ef50b2f3b2596c7d5069edb02ffef38daf296a103b9e94a3fbd6d308ab8e89619fb136f9e8177a8deb33c7c111cad1f36699b32242025ecf1733044b2795c1fd4390fb0a347beae59eaf5589c34e30ac619f9211eb819c250d8410b509ddf66a955fecd2cae184b859fdf22845d82e2dfc46c920f14524fc9d5497bcddb368507169c4366ef3ff35186ee268b1d3fa264eac21a954744d817c439f34e5a3082412eaf0bbb84423924108807a622147c7f5b87d01873ee9b9d0b04bebe81260f1ea4e5344913bfff9f353b1bce7de59691cb8f15e3349fcc342a218a7b632c79f6192b78b609db8d87bf4804561e9580141823b33200d8c6b05a06c1d73011e2d57ad9850cc95fc6eae5be0e3f8e7a3b28e8dbde1dc1bcdf06d030ff1463fa18b06c0df4c6b9ed8de71c16b071b35707e1e55a21f7b5f542e85e0b3fe632d60585cb3e981091e3d69369990aa51f359541a6e1e36e8abfd811603a7b9271f3ddc38588ab0edb74bc7c8a4c2d39a2dde032b6d189aa025bcc941f37d3429a3b16560287eb9540fa9363b1c1d264c73a5f34dd6a9d94bfd9680320539fa727285986533d9520d0372e54bb8e7b4703e3fa18127abeb36558b51c88f39176aadc26f813482fa513030ea065baa977c9a27d338cc080eee9d092bf3ae3b9e1f36d61a6fe73fc0d3ffd1dcd6913da84c5034e2943c2f2ec89023a80a5bc7de8046e6db5b6d3284273e1cc872c25a102839e471d17e7b8360618c879cf6b20bddabc7af261ef40a46efc4ae2eb41d070a9a6d9cbaed90e284bcc8585034fdcb95ee646ba1eea609fa1af19ae0678c5e18fd77e7cb4b1556b2e797b1c4c87cd377c10d38a4cd51d09055194deb03b3c7a82aacdcf5a268c64f825b37ae9bad7e52239f7db45266f0b21aa397fd09b49f0f0ba727ff235ab0cba2cec0794f5744cc0e70f98438d0de4526e3253f979efd38b32ef727f745b4e3a92880696c6de19276a8c4f17dfa66dcbb1de55fbaa77eff88cbceb64a55843f862cde3e9e08784ae4faa94d0cf266f2edc2219ad606ed72196d24b68180844521715e1075d6134b547447dd94e7d772ec2274a09ac639ffc81eec83d86eb9c300f7ed88ceae4222892bdec034c30cbf605b7feb5ea399ea2714e458277d275443b31750476bd349d229df3f6278f1703d95445ce07a5fb4edffb5fddd11c6077676073b4c74ff6f372acf9553abe1fcaf56360da5ac65cb1b838bb652af3dec5e557650faf509f749a5a3add4eed4551850cd0909a2c8a3c291add35671d25016492988b10817bc6f53f3dbe8b463def91bf55a19e9b93815528b67a27fc97a32b7f928d740c60c768f674fb2b8337c2f60f1253c30080f7079c4321a189a8c89745fd8ccfed122a0ee2be72503b983e8cc57ea4bc454fbf0d8387fe6d64e64896df436c4d0895007a1c2589fe39d87c816bd06f83a46517af6056f79702e3cfe4dfaf3e9a220d7b237902106c2cffa03eafe4923562aec5a6c649ad833a1a9c89c4f2e16fcc2d0c04184db87e84117261089a88defa8237ec4be0b5e914191a3e5af9014befa969bb95b1320514904144ef8c9956c9d2943a90c3e00e71c437936e33ccfb17a1182caa99aba6cf62db10c742a7e020f9464e650913eb763912d70b101f6c538b7183e338c79606bed41a13981050f111524571f4ef14f674b76aad0bdd6ed518a355df758c973002e9380a30cecaef8e0b9538509b878f7b5d7670f9cd2aa923baeee3e26991acab5302171698d5bfdecc9c8ed5f41e5cf5c42a93597419080536cea6c7150c51b7547be9d8bd5c2093c8efed9c9ae54c736a048702974e9cccd0a4ff77359e04cd94ad39db5ab68a1b9a380edea868b024626d2299c41aba10fd6f3a9619d3f268f7bfa272524f46eec3de4f8165c0c3d72988430ff7ea13afca7c69252f326042db418964a665ebec2b5883d2371ea2449fc01c7c767d79f2655127930f11d968c9ef91231e059aba1267712c107e1c149d0c85cbb96414be1be3425c31a3037a12661cd917c467a16a6ce3c00ae4f77e26348dc8606047e583fe3ec72fad33c06a1bca8866a3cb87d0dc1045a0", 0xffffffff, r0, 0x4}, 0x38) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x8, 0x5, 0x6, 0xfffffffffffffe56, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffffe}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3f}, @call={0x85, 0x0, 0x0, 0xa0}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x88, &(0x7f00000001c0)=""/136, 0x41100, 0x8, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0x9, 0x5, 0xb2}, 0x10, 0xffffffffffffffff}, 0x78) 19:20:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x1000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40005, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)="4ba56cfbde4d2ed35cc79eb87106f3ef03f173b94e6aae1b165ed8ce76d6ae15c516b9bd5e869a9cdb81e4a5ac5542cf51d134f95ce53891bb633885b2f655bccde15dbc2431ef8946b5c67852a8bbe582be8f64ecf8", &(0x7f0000000080)=@tcp=r1, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f00000031c0)=""/102400}, 0x20) accept$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r5, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000002a00"/20, @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r4, 0xf, r5, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r6, r3}, 0x78) r7 = dup(r1) r8 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380), 0x440000, 0x0) mmap(&(0x7f0000675000/0x4000)=nil, 0x4000, 0x2000005, 0x2010, r8, 0xee920000) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xd, 0x8, &(0x7f0000000140)=@raw=[@call={0x85, 0x0, 0x0, 0xa4}, @generic={0x1, 0x7, 0x2, 0xab7, 0x5}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x0, 0xb, 0x8, 0xb, 0xfffffffffffffff8, 0xffffffffffffffff}], &(0x7f00000001c0)='GPL\x00', 0x200, 0x0, 0x0, 0x41100, 0x8, '\x00', r2, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x1, 0x9, 0x7f}, 0x10, r6, r7}, 0x78) 19:20:35 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000001c0)="b9", 0x1}, {&(0x7f00000002c0)='y', 0x1}, {&(0x7f00000003c0)='&', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000900)=[{0x28, 0x0, 0x0, "1c67d247f4ffec8efe0c4b8dc3ea1c4227"}], 0x28}, 0x20000044) 19:20:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100, 0x4) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x80100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = syz_mount_image$squashfs(0x0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffe00, 0x3, &(0x7f0000000140)=[{&(0x7f0000000640)="de8635e86e2c1ac7104e515299b8cec7a0c27862588451c7ec08622f3273eff74400dd9d48c0dd735b302edda0a5fcfdea00bd8f93b520afe08626ee89d518272af542c932192a8f4399cc37428f0021132436c09fea4af0", 0x58}, {&(0x7f00000003c0), 0x0, 0x81}, {&(0x7f0000000300)="b2", 0x1, 0x5}], 0x26483, &(0x7f0000000540)={[{'security.capability\x00'}, {'!+*){-,<\'{@\\#^:8+^'}, {'.#\'+\xcd&#))]'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) move_mount(r2, &(0x7f00000005c0)='./file0/file0\x00', r1, &(0x7f0000000600)='./bus\x00', 0x51) chdir(&(0x7f0000000240)='./file0\x00') r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x401ffc000) fsetxattr$security_capability(r3, &(0x7f00000001c0), &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0x5}, {0x8, 0x6}]}, 0x14, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0x8, 0xfff, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x7, 0x7, 0xdf7f, 0x3}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x9d}, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x0, 0x9, 0x6, 0x1, 0xc, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xa, 0x8, 0x1f}, 0x10}, 0x78) 19:20:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x2000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 489.057635][T24558] loop5: detected capacity change from 0 to 264192 19:20:36 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000003c0)="776fa8dd60223e0ce2dea52c9d55882e87a3257595cbfe72852fcb163448e682cacd576a1d4acfb02515b6c37ccbccc835a256e315ee19ff08796c70fbf0ec8d550179beefb6a1c655c87fe3ec796d331febdccbea6d784763fd512cb1b92fe48c4df8363ad7d1ff570654902ba46a965a9ad27acfc57a59cc4c1ba8b6f6c05f52ed501e9acdf3f8853330dad8b16fe1", 0x90, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 19:20:36 executing program 1: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000640)=[{&(0x7f0000000080)="ce", 0x1, 0xfffffffffffffffe}, {&(0x7f00000000c0)="9e", 0x1}, {&(0x7f00000002c0)='-', 0x1, 0x8001}], 0x0, 0x0) 19:20:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:36 executing program 0: ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/37}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0xfffffffc, 0x40002, 0x2, 0x1009}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xb4, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x0, 0x22}}}}, [@NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "e91dc3292539d0427e309c6f01"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY={0x64, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x28, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "76649de5ab"}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "28da2752801c2533deda78fc4d"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "b47b9472e8554c6e561dc8d9cf"}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x6000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000001540)={0x15, 0x800, 0x80000001, 0x9, 0xe0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e24, 0x45e3, 0x4e20, 0xfd, 0x2, 0x0, 0xa0, 0x21, r1, 0xffffffffffffffff}, {0x1, 0x4, 0x0, 0x9, 0x2a, 0x7fff, 0x6, 0x7}, {0x1a, 0x1000, 0x5}, 0x3b, 0x0, 0x2, 0x0, 0x2, 0x3}, {{@in=@rand_addr=0x64010102, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3503, 0x0, 0x3, 0x80, 0x5, 0x3, 0x8}}, 0xe8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001200), 0x4501c0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @multicast1, @dev}, &(0x7f0000001340)=0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x8000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x2, 0x3, &(0x7f0000001240)=@raw=[@map={0x18, 0x3, 0x1, 0x0, r2}, @exit], &(0x7f0000001280)='syzkaller\x00', 0x6, 0x38, &(0x7f00000012c0)=""/56, 0x41000, 0x10, '\x00', r3, 0x3, r4, 0x8, &(0x7f0000001380)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000013c0)={0x3, 0x9, 0x8001, 0x7}, 0x10, 0x0, r5}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bind(r2, &(0x7f00000014c0)=@l2={0x1f, 0x80, @none, 0x3ff, 0x3}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xc, 0x0, &(0x7f0000000040), &(0x7f0000001480)='syzkaller\x00', 0x4, 0xfd, &(0x7f00000002c0)=""/253, 0x41000, 0x1, '\x00', r3, 0x489b0cd2ffb346a3, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xa, 0x3, 0x3}, 0x10, 0xffffffffffffffff, r6}, 0x78) 19:20:36 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040), 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cc2f8498"}, 0x0, 0x0, @userptr, 0x8}) 19:20:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x7000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000001c0)={'filter\x00', 0x0, [0x5, 0x1, 0x8, 0x4000000, 0x80000000]}, &(0x7f0000000240)=0x54) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = syz_open_dev$vcsu(&(0x7f0000000140), 0x1, 0x208000) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102384}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000040)={'nat\x00', 0x0, [0xfffffff9, 0x200, 0x5, 0x8, 0x9]}, &(0x7f00000000c0)=0x54) 19:20:36 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000300), 0x2a000, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsdef}, {@obj_user={'obj_user', 0x3d, '(,'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, r1}}]}}) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000300), 0x2a000, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsdef}, {@obj_user={'obj_user', 0x3d, '(,'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, r4}}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r6 = getuid() r7 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000300), 0x2a000, &(0x7f0000000600)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsdef}, {@obj_user={'obj_user', 0x3d, '(,'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, r9}}]}}) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000031c0)="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", 0x2000, &(0x7f0000000c40)={&(0x7f0000000000)={0x50, 0x0, 0x0, {0x7, 0x22, 0x1, 0x2500221, 0x1, 0x2, 0x109, 0xa7b0}}, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x5, {0x204}}, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x9}}, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x101, {0x8}}, &(0x7f00000001c0)={0x18, 0x0, 0x7f, {0x9}}, &(0x7f0000000240)={0x28, 0xfffffffffffffff5, 0x1, {{0x5, 0x80000001, 0x2}}}, &(0x7f0000000280)={0x60, 0xfffffffffffffffe, 0x953d, {{0xffffffffffff0000, 0x7fff, 0xbb9c, 0x1, 0x1, 0xffffffff, 0xffff7fff, 0x8}}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x200}}, &(0x7f0000000340)=ANY=[@ANYBLOB="110000006816bdaaa0f6000020b88a2d00"], &(0x7f0000000380)={0x20, 0x0, 0x9, {0x0, 0x11}}, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, 0x5, {0x2, 0x99, 0x0, {0x5, 0x5, 0x0, 0xd55, 0x3, 0x2, 0x0, 0x4, 0x7fff, 0x1000, 0x1, 0xee01, 0xee01, 0x4fd, 0x4}}}, &(0x7f0000000440)={0x90, 0x0, 0x80, {0x2, 0x1, 0x8, 0x509, 0x6, 0x7, {0x3, 0x4, 0x8, 0xfffffffeffffffff, 0x7, 0x200, 0x7ec, 0xd4f, 0x6, 0x6000, 0xfff, 0x0, 0x0, 0x10000, 0x3}}}, &(0x7f0000000500)={0x50, 0x0, 0x0, [{0x1, 0x7, 0x1, 0x7, '\x00'}, {0x6, 0xe643, 0x1, 0x200, '\x00'}]}, &(0x7f0000000800)={0x330, 0xffffffffffffffda, 0x9, [{{0x5, 0x3, 0xddb, 0x3f, 0x1, 0xfffffff7, {0x2, 0x1135, 0xfffffffeffffffff, 0x18000, 0xe7e, 0x21376db2, 0xfffffff7, 0x7, 0x2, 0x2000, 0x7b15, 0xffffffffffffffff, 0x0, 0x2f8c, 0x8}}, {0x5, 0x200, 0x2, 0x7, '\x18^'}}, {{0x6, 0x0, 0x7, 0x10001, 0xfffffff9, 0x8, {0x2, 0x5, 0xe19f, 0x5, 0x4, 0xfff, 0x100, 0x4, 0x9, 0xd2b39dafe5095ec4, 0x3, 0x0, 0x0, 0x7, 0x5}}, {0x3, 0x9, 0x1, 0x2b8, '\x00'}}, {{0x0, 0x0, 0x8, 0x4, 0x9, 0x40f, {0x1, 0xffffffff, 0x9, 0x1, 0x3, 0x0, 0x80000001, 0x3, 0xfff, 0xa000, 0x8, 0xee01, r0, 0x6, 0x7}}, {0x5, 0xff, 0x1, 0x7fffffff, '\x00'}}, {{0x1, 0x0, 0xcb, 0x51, 0xfffffe01, 0x3, {0x1, 0x0, 0x7, 0x1000, 0x53fd, 0x5, 0x7, 0x9, 0x7, 0x6000, 0x1ad, 0xee01, 0x0, 0x9, 0x5}}, {0x2, 0x400, 0x1, 0x7, '\x00'}}, {{0x0, 0x2, 0x7, 0x2, 0x10001, 0x80000001, {0x4, 0x5, 0x3f, 0x2, 0xd70, 0x7, 0x6, 0xaec, 0xf4, 0x1000, 0xfffffffd, r4, r5, 0x0, 0x5a}}, {0x5, 0xffffffffffff53d1, 0x3, 0x4, ').^'}}]}, &(0x7f0000000b40)={0xa0, 0x0, 0x1, {{0x1, 0x2, 0xa7a, 0x5, 0x80000001, 0x3, {0x3, 0x906, 0x3, 0x4c, 0x8, 0x9, 0x9, 0x8, 0x20, 0x6000, 0xffffffb9, r6, r8, 0x1000, 0x14a0}}, {0x0, 0x2}}}, &(0x7f0000000c00)={0x20, 0x0, 0x0, {0x8001, 0x4, 0xffffffc1, 0xce8b}}}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r10, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r10, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xc000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0xe00}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000300)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r2, &(0x7f0000000280)="4332cb5a337ca96c921916f76a636fc8336d4b26d89393b9dc3815c8f8cf33fd1a616b2ea8bb13369d59149c15757ae110", &(0x7f00000011c0)=""/4096}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_ext={0x1c, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0xb, 0x4, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @alu={0x4, 0x0, 0x7, 0x2, 0x2, 0xfffffffffffffe3c, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000040)='GPL\x00', 0x232, 0x51, &(0x7f0000000080)=""/81, 0x40f00, 0x19, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x2, 0x9, 0x401}, 0x10, 0x2ece0}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:36 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000003c0)="776fa8dd60223e0ce2dea52c9d55882e87a3257595cbfe72852fcb163448e682cacd576a1d4acfb02515b6c37ccbccc835a256e315ee19ff08796c70fbf0ec8d550179beefb6a1c655c87fe3ec796d331febdccbea6d784763fd512cb1b92fe48c4df8363ad7d1ff570654902ba46a965a9ad27acfc57a59cc4c1ba8b6f6c05f52ed501e9acdf3f8853330dad8b16fe1", 0x90, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 19:20:36 executing program 1: syz_open_dev$dri(&(0x7f0000000440), 0x1, 0xa4800) 19:20:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="0100000000000000000057004b2999000008", @ANYRES32=r4, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, r3, 0x8, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x1c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "f61b2c38bf912bb505db6d88d8"}, @NL80211_ATTR_KEY_SEQ={0x8, 0xa, '@vII'}]}, 0x60}, 0x1, 0x0, 0x0, 0x84}, 0x4009010) 19:20:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000000)='\x00', 0x0, r2) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102398}, 0x20) 19:20:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x12000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:36 executing program 1: syz_open_dev$dri(&(0x7f0000000440), 0x1, 0xa4800) [ 490.257761][T24628] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 19:20:36 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x13, 0x0, 0x40002, 0x4, 0x0, r0, 0x0, '\x00', 0x0, r0, 0x0, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001200)={r0, &(0x7f00000031c0)="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"}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000013c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000001240), 0x24182) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001380)={r3, &(0x7f0000001280)="b8e2e4f5ed7b482668a67c4c9de1659d45080d85b12b3d34e57820b63243dbc73fabbf1c455e8459b32449a71eebd389fae21814655209257ff3f15c22adc18f69fda24f292afb5ddb4e847649cc25fb0225cd00d1a4a705c3ddc520db27b607b8764b77781cb0bc773ec094fddeb0c9c43dcf32f4707968c913885a9e9866b3f822c661eff94a073122831f337fb3e4a9042ba0", &(0x7f0000001340)=@udp=r0, 0x1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000040)='GPL\x00', 0x9, 0xd8, &(0x7f0000001400)=""/216, 0x41100, 0x1, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000001500)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x8, 0x1000, 0x5}, 0x10, 0x0, r2}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f000001d1c0)=""/102383, 0x4}, 0x20) 19:20:36 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r1, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_PMKID={0x14, 0x55, "a174df57c4fbb647d085ceab79c07039"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000821}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r3 = accept(r0, &(0x7f0000000200)=@can={0x1d, 0x0}, &(0x7f0000000280)=0x80) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x10, 0x4, 0x401, 0x1, 0x800, 0xffffffffffffffff, 0x5, '\x00', r8, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r5, 0x8, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r6}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x60008080}, 0x400c000) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r9, 0x0) setsockopt$packet_drop_memb(r9, 0x107, 0x2, &(0x7f0000000440)={r4, 0x1, 0x6, @remote}, 0x10) 19:20:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x3f000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="c3e8093df5aee0ecbb550b64742c7bc19665dbb8d64022fd06286530ac70884e4c3b038237c97a6812be65ca460ccdb06f717e035916e70692d2d45f8208952c9b5ed8e43703d03643270ad9789d8848318a2692a8098a7a7daa5cce0f515b07c7f55571a3cccdee7def1e6d883a395b2d3bed83a538564b00a10d3b5b4f24d8f8c6d485733d34e0a951288a0c823fd0309946b0f8573657d81b6aa53f5b58ef26f7f7b4f397320c18001612f4b1205011c270d408595064d2950847b5d038072319065b8583c262343f576edb06bfd98143300c4607f86afd4b78dcb641d95a85594813fe0e111b83cc83fac7f5a3e9047639", &(0x7f0000000140)=@udp, 0x7}, 0x20) 19:20:37 executing program 1: syz_open_dev$dri(&(0x7f0000000440), 0x1, 0xa4800) 19:20:37 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000003c0)="776fa8dd60223e0ce2dea52c9d55882e87a3257595cbfe72852fcb163448e682cacd576a1d4acfb02515b6c37ccbccc835a256e315ee19ff08796c70fbf0ec8d550179beefb6a1c655c87fe3ec796d331febdccbea6d784763fd512cb1b92fe48c4df8363ad7d1ff570654902ba46a965a9ad27acfc57a59cc4c1ba8b6f6c05f52ed501e9acdf3f8853330dad8b16fe1", 0x90, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 19:20:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfc000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0xad2, 0x3fffe, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:37 executing program 1: syz_open_dev$dri(&(0x7f0000000440), 0x1, 0xa4800) 19:20:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r3, 0xf, r4, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r5, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x1, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x0, 0x6, 0x4, 0x2, 0x80}], &(0x7f0000000300)='syzkaller\x00', 0x5a, 0x57, &(0x7f0000000340)=""/87, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x2, 0x9, 0x8}, 0x10, r5}, 0x78) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000000)="3b36831a8f146e7fe1054dadff64ab8d2bd6ff83c1181270d1de410d04df18129ecd999f4ab807a1", &(0x7f0000000040)=""/94, &(0x7f00000001c0)="074a7fc1f1f2576baab71536e4c0277df76378199dcaf8a8a47b4628df7caf2087a8250f3b120c1fcf7f7a1bb17966feb55b08022f9e3c5d86de527abe3866fdf76074ca4998fad2abbd49e344cef1470cbccf1a21b8bfa3a7acfea788bee76003d85dfa4d347ba0e757aa6de6d497375c48387cf0bebd7519716d7b58a55e7826f456122db7d97be71a930167b1a0b837961f958342a40bf6a572b129537f7a82c99447762eae7a6ffcd73afd94d529c8500a9814dbec0faa968bbb6df39fa200e91416", &(0x7f00000000c0)="092751c581bbacfe56a3293f76688143090ebdebb8c5d3accb18def9fb26390a66ccc089f33120d788451a4ead4b", 0x400000, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000700)=ANY=[@ANYBLOB="347ba72b0487a53221ad6334693d81d118000000c90c0000000000000900000095000000000000002365800065535b5f9500000000000000183200000400000000000000000000001fc1050001000000"], &(0x7f0000000780)='GPL\x00', 0x401, 0x15, &(0x7f00000007c0)=""/21, 0x41100, 0x11, '\x00', r3, 0x1a, r1, 0x8, &(0x7f0000000800)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x1, 0x0, 0x100, 0xffffffc1}, 0x10}, 0x78) 19:20:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x22) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000000)="973c623083a16acbb9c5e732302238e11408b255814bef33beacaa88c3b7c77f7e4c4977e141cee4d2a74106cdce3e", &(0x7f00000001c0)=""/248, &(0x7f0000000040)="b0500e041cc0c06af69044cbca821a364bde8daae96191a7eb74513e8b1b682a1de179610f7951ce5681e1402f8d5053a61b0da5eb7f97480583685fb4e857d2c10f12d5feed21fe91224b6222bd853a5bfba16955e50b3d0ccc63fc533b0f", &(0x7f00000002c0)="32cd828449ba38734b63ac16cfeb85fe635526c00f9024e869f052d38845270270476bfa51a1b3e5cf73f5edcd977326e5ee6616470559116f7541cd431a0b823e28ec554af5b4b9735d6de85105e3b31643452a1292eb68a391c4d53a41986a52dcbb8f90eaf17743adb87676dcc6351737d58796d8da6d843ba88a94977e8932e22acf99d07a02dd211fa62a9987baf7afcdf500d7c4ba5d7bbbf988ec5f603aa22d89fab05069d2cfd0dcd94cdaf97676", 0x3, r1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfe800000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000011c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:37 executing program 1: socketpair(0x2b, 0x1, 0x8001, &(0x7f0000000000)) 19:20:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000040)="5d563781fcbc6ded2482636acab71e4d88f0be57de020165461a06e765c3d41c739fb388288a6ea90b43194699e83c10a17b49c35bff672d68ae1aae298b9c62121834773f7209a16aef19852066ca7978218e91e88c76e2cd037c0ce83a86ff11c3b377265cca4aa74b87a50d1d8566a9119dd3ca32b01ff5fe2edce4b76ad3b003523c96f620e31fb08b5622512d1ceb97d496a52b90ab2952776797d9c9133be81c24d9730b0fc45aa8d6cb4bdf89107e0f88163859a5fa614c138b9f20278c6b7b8b99b1ac2f20deb264d8bd39665c96", &(0x7f00000001c0)=""/167, &(0x7f0000000280)="f5a1da93c17af36bec045baa362d42d75a553a3afcccdb44443ecd839ebc61e7d80f1cd83739a858269929e3848a83e8cd9faaabf70cb40bb6bcb5e8d10ac189ade5ec5afb0f83e9d0a2260a356badeac6d7c1f15cb6025f38dcc9d169a2ec7d235d116fc87b296c9df1cff0df68a452ac00f6203291eb504a6a", &(0x7f0000000300)="5147078f8bedaba86bc9ed36fd5be98c8af5ccc7d94189d94c37da3b20d08d29592a4dcff005c0185881317d79fc23d12d88d7e0058f53c54da8bca63849793e063e8cdd71513e3cf2c52209b92f47bc8a19f7c17158d178064e0ae17f0228a6189cf7650f4f5d8f3ea94c726284f33c2c7b9fd00df4387b2e31e4fdc6ad13f6ec8e67bfb1c8a4", 0xc47, r1, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000011c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = fsopen(&(0x7f0000000200)='btrfs\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000)="730dc81b1b19d5475482a162189cd330fdd7455893a7c98b5def56e208d992acf64c58468f979bda02a251e3b40a5d34b561fc114f2d628b2160bc1c78eeb9", &(0x7f0000000040)=""/38}, 0x20) write$binfmt_elf64(r0, &(0x7f00000021c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x3f, 0xd1, 0xff, 0x200, 0x3, 0x3, 0xff00000, 0x285, 0x40, 0x2, 0x5, 0x7f, 0x38, 0x1, 0x9, 0x40, 0x2}, [{0x1, 0x5, 0x5, 0x44a, 0x3, 0x6, 0xffffffff, 0x1}, {0x2, 0xc00, 0xc9, 0x4, 0x8000, 0x18a20000000000, 0xff, 0x7}], "1d482b8b00b0fbdb7d91eb5fc3e7b2a28a29cccafbb2a43e2acb64e21622d646ec7f4c4f331cc87c86fc30006c20c81b80cb4da4ae63ce7320855e0c65d20d937accaabeef3358aeec29e9a74d13d34292290db01a87228d700b30bf6aaa6950d5d34149650ca9429bf5dc036279aaeac9ad7b206935c38f45589f904cda0a5fafcf5b016e31593fe7e293be2c2299022ffd0af2c69e97fc41ff85c7f4854c2fbba9239bcc9a7672064988f537ce5325f172f7504995c0ad9b55d9d74f544555a77dc43f17583e218cff89fc03d79cf088a2740514b9b40337b824f7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x98c) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x400, 0x2a, 0xfffffe01, 0x1881, r2, 0x7ff, '\x00', r3, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x40) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r5, @ANYRES32=r5, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x25dfdbfc, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x7, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1e57791f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x23}, @exit]}, &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000280), 0x41000, 0x15, '\x00', r8, 0x12, r2, 0x8, &(0x7f00000002c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x10, 0x8, 0x3}, 0x10, 0xffffffffffffffff}, 0x78) 19:20:37 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000002600)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1, 0x20000007}}, 0x24) 19:20:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfec00000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:37 executing program 4: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$user(0x0, 0x0, &(0x7f00000003c0)="776fa8dd60223e0ce2dea52c9d55882e87a3257595cbfe72852fcb163448e682cacd576a1d4acfb02515b6c37ccbccc835a256e315ee19ff08796c70fbf0ec8d550179beefb6a1c655c87fe3ec796d331febdccbea6d784763fd512cb1b92fe48c4df8363ad7d1ff570654902ba46a965a9ad27acfc57a59cc4c1ba8b6f6c05f52ed501e9acdf3f8853330dad8b16fe1", 0x90, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="a8", 0x1, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$user(&(0x7f0000000200), &(0x7f00000005c0), &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 19:20:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x0, 0x40002, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x200000}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000000)="0298f9948482d1d626cfc7c05e12b27843fdb7b60d67cb66992dff28da88028c5a976715bdf3e211148b054d8405e125140d6f05e621f28afe658338526db16994400347facbb21f874df0ae7a081ba1536ceca09c352a656dd66a8b59e3ec37e58c2c18fc025b8c1fa518f5f9b0bad732b14744aa747f61ebd62ffe194a296feb6c641ab7d0ee7d353a19bc333c2a1f45749b91526eb351cd45e5c584526742d02f8f60e566894f603020ff4ac5995a0fd7f7f88fb6c93542330f310187124c1f331ebfb04e2ade5250e5a9865c", &(0x7f0000000140)=""/31, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9813"], 0x14}}, 0x0) 19:20:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xff000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000000)="6b9af69f69b621841eddbea2196d8c5cc94da84ab860f00819d498c76669e8a952904ea1747aca86c8af14f714bfe05ae9f97904c5f9cb5f234fadcd7982330310b4c1f7b3713231593e5ac2bb4bd8a6164819d760f233aa14cc3ff22b60b44ef23ae2a505e98241239ce46541b2ce786e7402205510e017c2fd1ad32369afa02286a578f500e677d9e6c06056bba6ffd1c0b85b4513c6e13e4c4b2e4288e23f9f6fd3b79c407e8ba18ff30b3ac23cca344f457aeeca253d3bcac7c55bf31d57941c434e8f70f9c2a6fb2367e6ca17fc20b5b0918b6c0fabb5d7c486639080c5af88668da12e", &(0x7f0000000140)=""/3, 0x4}, 0x20) 19:20:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r2, 0xf, r3, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r4, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x6, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x5, 0x4, 0x50, 0x8}, @call={0x85, 0x0, 0x0, 0x58}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x80, 0xa6, &(0x7f00000001c0)=""/166, 0x41100, 0x19, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0xa, 0x1}, 0x10, r4}, 0x78) 19:20:38 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r1, @ANYRES32=r1, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x7, 0x42002, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x5}, 0x40) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, 0x3f7, 0x4, 0x70bd29, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20000001) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r5, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r5, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9813"], 0x14}}, 0x0) 19:20:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x4000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000140)=""/67, 0x43}, {&(0x7f00000001c0)=""/132, 0x84}, {&(0x7f0000000280)=""/168, 0xa8}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/246, 0xf6}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000600)=""/8, 0x8}], 0x7, 0x1, 0x3ff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) sendto$netrom(r0, &(0x7f0000000000)="2a77a47084c67d1d730748323d08975f75b10bb80771ffa7aa6c55efa5155fb6e16c9af08b4ccf78c20c91533db19749350b966ffc83583d04b73a3f0cb740c4911572790ad067c75c84a6233259fe8a27eead83ae35943f748ec58db673bba5ae885f5661a0c23ef8890a9a36a9d7eff44420badaa6e0ff79a502fb76cff92117f70f0aeaf3c29d91b1010b8515d3313ba389023280da54917564c9e762a54347648748eadf5ae5b06a9f60875649e66f6877bdf38645ad7354a7d9b4f64e4a965999c4e3350efed480d1e258c03fc0f1fed3d19970e8f6b8f205ead8d3a70dbd723e192069f72321", 0xe9, 0x8101, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xfffffffffffffee3, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) fstatfs(r2, &(0x7f00000006c0)=""/195) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) 19:20:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9813"], 0x14}}, 0x0) 19:20:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="ea7ae0e4d86b19f18ebcb720edc61000bc79cbac437835e1fd8f48b05bcac7f9dd461f109c83ca4d53ae9519251b03b68afb994edb7e868aefceeda82452ac422fa443a8d2f34e5be311a4e37c0ebc111ee7132a369bfe38cd96a02c5f1f8ea3f138d0dcea94cc7c69fd4c0fef4991c2b4dcf8b393d2ed1f5407726a3bcc032d2c9d369dac935a001e893faad90005e1c6b3e265bb9df93620f9e7c40b4041807ea3f0242e39f7c646d1d9b38bfd234cb411695866a966ca6d6650de", &(0x7f00000011c0)=""/4096, 0x4}, 0x20) 19:20:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x100000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x5, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000140)='net_prio.prioidx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x8, &(0x7f0000000180)=@raw=[@map={0x18, 0x9, 0x1, 0x0, r3}, @jmp={0x5, 0x1, 0xa, 0xa, 0x6, 0x80, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5613}, @alu={0x7, 0x1, 0xd, 0x41e15da2f3e493e4, 0x0, 0x4, 0xfffffffffffffffc}, @generic={0x8, 0x1, 0x6, 0x5, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f00000001c0)='GPL\x00', 0x0, 0xf2, &(0x7f0000000200)=""/242, 0x41100, 0x1, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x6, 0x1, 0x14c}, 0x10, 0x0, r2}, 0x78) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x10}, 0xc) 19:20:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0xd0, 0x9, 0xaa0, r0, 0xbd, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)="97a85cedd6120d988270ea0855e78df3e7a1cdd29db313169299739ecccf25fc885cd955e71595343590c01e48952af55df8d9c25ae3b03fda60cdc6490cdb7ea9fbae9e68b23d37d10f0e6bf0a18c0bdd4b0fb8324170f4467114cc25939df2b79cccbd7950993c37a6b9cfc7edf8a59b0137db6f0d"}, 0x20) 19:20:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9813"], 0x14}}, 0x0) 19:20:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d980d"], 0x14}}, 0x0) 19:20:38 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/107) 19:20:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x200000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1a, 0x3, 0x40002, 0x7}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4083}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:38 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x400801, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x8, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:38 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x27eb14d5e18e6bd4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xe692, 0x800, 0xfffffffffffffffc}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x80000004, 0x40002, 0x2, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x600000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:38 executing program 1: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x492b80, 0x0) 19:20:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000000), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000080)}, {&(0x7f0000000340)=""/72, 0x48}, {&(0x7f00000000c0)}], 0x5, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}], 0x1, 0xc0002040, &(0x7f0000000500)={0x77359400}) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1a, 0x4, &(0x7f0000000540)=@raw=[@jmp={0x5, 0x0, 0x1, 0xa, 0x8, 0x2, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x9, 0x0, 0xb, 0x100, 0xfffffffffffffffc}, @map={0x18, 0x8, 0x1, 0x0, r1}], &(0x7f0000000580)='syzkaller\x00', 0x8, 0x1f, &(0x7f00000005c0)=""/31, 0x41000, 0x8, '\x00', r6, 0xf, r7, 0x8, &(0x7f0000000600)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x9, 0x67b, 0x9}, 0x10, 0xffffffffffffffff}, 0x78) 19:20:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="bd31", &(0x7f0000000040)=""/95}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000002c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x117, &(0x7f0000000500)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:20:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'syztnl2\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00705f7674693001ff03f7216ca00014", @ANYRES32=0x0, @ANYBLOB="0010000100000002000000024b13006c00670000040290780000000000000000071334e0000002e000000200000000640101028327b57f000001e00000020a01010000000000ac1414aaac1e0101ac1e00010a010101ac1e00010100008612ffffffff000ce428525118efe6fae95086098bfed27f4db32f"]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x12, 0x2, 0x5, 0x8206, 0x2, 0xffffffffffffffff, 0x1, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r5, @ANYRES32=r5, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x10, 0xffffffff, 0x6}, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x40ba}}, 0x10) r10 = openat$cgroup_ro(r6, &(0x7f0000000440)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x9, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7fff}, @map_val={0x18, 0x9, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0xffff}, @generic={0x1f, 0x7, 0x2, 0x8, 0x58}, @jmp={0x5, 0x0, 0x2, 0xa, 0x9, 0x20, 0xfffffffffffffffc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x1f, &(0x7f0000000080)=""/31, 0x41100, 0x4, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x9, 0x9, 0x7}, 0x10, r9}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:39 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x0, @any, 0x8}, 0xe) 19:20:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x700000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000080)="da5ac892487e9a24b3bc53f4217ffd18ed0adedebc105e5e30aa283e9856d6859ee6a40ebc0fb514902e7de7c1c897677f4016f16e2ab41f4d6573c759c33e0ac6b35eaa013b0fba9efa15e8dfaad4ad8b32bc", &(0x7f00000011c0)=""/4096, 0x4}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000000)="27298ac6b182f6868b031fe4e51dd659ad212279e16c099693786809", &(0x7f00000001c0)=""/226, 0x4}, 0x20) 19:20:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000000)="e16aab8196cf33847611d406b831948034ce05b97cfc6a50074aaa4b69bd10a5a659069190af206ee30de209301994fa23b3a485ac44e7cfb632871c443bb49bb4f3d79e935a98429da5ea92bd13fb13018064d00cb299f7bc8eec0b382aa131ba861ff79f86b817d91a5c8f277c0c09d2717fa52ff85d43ffc409cfd320483fb15d7d550c4612db4806c050f3982642e40139ddf93bce8d9eec3f1799d4d1dae0124dc171daa5e59e9c0d2e86fa689fab28ab309a0aa113ae2082a657ee35001747cbd69be34780e256788fa7835d5afc38afb047", &(0x7f0000000140)=""/72}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) 19:20:39 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r1, @ANYBLOB, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0xffffffff, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r5, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r5, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xc00000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x181) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r4, @ANYRES32=r4, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100766c616e000000001c0002800600010000030000040003800c000200100000000100000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB="61655587"], 0x5c}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="18230000", @ANYRES32=r1, @ANYBLOB="0000000002000000950000000000000018160000", @ANYRES32=r2, @ANYBLOB="6a8d98e6274421331815b62e", @ANYRES32=r0, @ANYBLOB="000000000000000012ba80000800000001bc8000ff03000085100000f8ffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x800, 0x0, 0x0, 0x40f00, 0xb, '\x00', r6, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xb, 0x4}, 0x10, 0x13194}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0xc, 0x40002, 0x2, 0x57, 0xffffffffffffffff, 0xcdce, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000004380)={&(0x7f00000031c0)="e970ae25c5e7d0f3ce086b2a959b4d6bad79108173c5472ec1", &(0x7f0000003200)=""/4096, &(0x7f00000073c0)="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", &(0x7f0000004280)="5047afd04d6873210908f01ae70615a949d86109d2f455f56659b8ac0a13df1a3dd473b914d8276858516b2e01ee3f1bc71f058a9236f63ef6deddec7a4372802f11c4b14464a217414faded0c68fb311effe0e5440a0cc4d0a86c8147970321b926b6ae426593a8a1041765d2b0f22ab0ae67eefd0e63ada5019a5170a5d1ec0dfb45eb5237d29ecf901e9bd02c6eebb77d11b0653e709fac032658e8d0d273ce9bca550a466d9041d66dbe65aa03ca5da599b8e914ba9a02c33e53a7595b802416f92ea578c4b59664c52650af248b7f596cf3a8eb9c8f6f44bc09912ed56e85910bcf5d", 0xff, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000043c0)={r0, 0x100000000, 0x6, 0x400}) recvmmsg$unix(r1, &(0x7f00000070c0)=[{{&(0x7f0000004400), 0x6e, &(0x7f0000005640)=[{&(0x7f0000004480)=""/4096, 0x1000}, {&(0x7f0000005480)=""/216, 0xd8}, {&(0x7f0000005580)=""/85, 0x55}, {&(0x7f0000005600)=""/8, 0x8}], 0x4}}, {{&(0x7f0000005680)=@abs, 0x6e, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/185, 0xb9}], 0x1}}, {{&(0x7f0000005800), 0x6e, &(0x7f0000005980)=[{&(0x7f0000005880)=""/211, 0xd3}], 0x1, &(0x7f00000059c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000005a00)=@abs, 0x6e, &(0x7f0000006c80)=[{&(0x7f0000005a80)=""/192, 0xc0}, {&(0x7f0000005b40)=""/11, 0xb}, {&(0x7f0000005b80)=""/237, 0xed}, {&(0x7f0000005c80)=""/4096, 0x1000}], 0x4, &(0x7f0000006cc0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x140}}, {{&(0x7f0000006e00), 0x6e, &(0x7f0000006f40)=[{&(0x7f0000006e80)=""/133, 0x85}], 0x1, &(0x7f0000006f80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}}], 0x5, 0x40, &(0x7f0000007200)={0x0, 0x989680}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x4, &(0x7f0000001580)=ANY=[], &(0x7f0000007240)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff99) r4 = syz_open_dev$vcsu(&(0x7f0000007280), 0x0, 0xc0002) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000007380)={0x14, 0x0, &(0x7f00000072c0)=[@dead_binder_done, @decrefs={0x40046307, 0x2}], 0x4e, 0x0, &(0x7f0000007300)="af4e35d475750b5c7327745fd28038dddbf2361a13a29bb5b4523433b40b6ce67894f848307fd20fff484f760f8fbde7c4ea995275465b4a6b730a2e837ada247b4a8e9dca89921aa10d552d8bad"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) preadv(r3, &(0x7f0000000640)=[{&(0x7f0000000080)=""/114, 0x72}, {&(0x7f00000001c0)=""/237, 0xed}, {&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f00000002c0)=""/198, 0xc6}, {&(0x7f00000003c0)=""/147, 0x93}, {&(0x7f0000000480)=""/111, 0x6f}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/128, 0x80}], 0x8, 0x3, 0xc1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000011c0)="939088fcf03415fff0b83b21a9eb87d401da3e874e89f00adc72e6f73cab17cf50d72eba4de9d61c09b398c1f8b602c6615d9b2dcd2ebdd76ec033149225a8b4e108628b83ffaf004b500b7c66e058f49fc248782d240d20fa146f3cc2beeaa525738ed3714065ef275e497319234162d248a574e9a461e52f478c85e9bf65c68549fa0730444811eb6e71b388e54909414d5113dc6a97d222242cfde8bee5500bb47d7797794b8eb4d86763eb5df0845ec98858310bdcde91a15703a5df69476171fa8811ebd9a4ba3158d9836f143a3384f3be8474c2d11a399dbaa9821d7883cbcdd1bec50cbe9165359b9e45a6336580a25ea896f8d511e50972d512bafa265f26f4cd06787ffabe130e80b07dccd92e67c11f87b0c1391cacfb1cb7ff1b8c8b3ebd6f6803a55adafe3f5ee6c83921ab4a1f332f7bad1418aa2f830edca772ee8b32c5e2f6e151adc306fb2e11236b80660e2c237fad9f20edd73cb0aefc047d9cce60ce29d69341a3f417174bf4e28bf9d6386716b678fd9f460ca95f98d328282a8b827e57283a52c2f21cc02012314d9b045370261b036d0ad6250d145cb9fb39867e2e7682587873b50f83fcd71fd82234bd2b6094191613d7f705c87be6c7146f1edeee111eb6d4746a1cad7d5812767096151f635aaaf12024de481f33168830cbae1eac54bf83997355857abacce5b22bdb83d324a9b46ed344c9a6512000b089bc661f662e8433da60fface2dfbe5442a341d676b9540f1f5c1f5d106cfed0187f79f6f390acb8157af2fac6a395c42cc3563a2bbcd2da65cf1b735508c69ae029117c9a845bdfc8519ae9247ef91de0ee414a7d34620e6e17a4b3f37d564241226f65da4297c3c485afd74305eb5850d805487a39dfa02ee69bcb114546c00f83206911be97fd0e6fc0f66e55f6584959ed185b4ee5e89ad1a22875bdd19ab354bc76267fd4ea2e19acd6a432295d939e288af2943a329fb5a96f66f2496299ac52bfde8c30371959d811205bb0b9d1040d369da4a093da31a1f6786043bbb9a8018ed40e32d7692e20967146f3f2c79dd143d851a8417fc46039f731635ffdba8f5c3a8794125f57a3922ea9510b8c674d08776ad4649d21c170a76bf0aa2de75e722f503dc4235990a351cef07392e99ab294ad392ed58efebdc797615ad1eb55bb70c75a178098359b16b4b15c92b63af7850d596e99c378fa10184bff9560e8005e8bb5128b3bf1d31ab59cddf3035c8b11d65e4ec3df113b150174535cf632e047b997c668680746153079763cbc9839144042a6dab5e2ae81a11bd84e2baa9adc614a14f9be3c238e83e9f41961f3dc64febb84992a1e2a737392f78769326a2de6ab527d939734693c2bb0795025505e2598d996b22c00394ae73337292c47886096bd54fa44d3441365972cdfc304fcdfe458e57d8ad991aacd71213e202abc4b07b8c57b9c80111a66208b5e4ea8734e5f8c1827d28a5a421870e97b796cbf4bdf3f804a9e1a831edc87bf4d4bb91c207062a36c79c4bad9febb22b195ef721747ad835a08b88aad4a8d3554bf796524352d5c4a3e86bc16643a18f9d6a1260a4034ce98705ad9ce6c8ea3d7365fb9b29bd56faa98013f1985b45d6cfa4f1cbd8e74c9b5d9d8deaac6a117b2305e9c1994fc9684db5d4fdbcb5a9f4d3833bd70200bf7749e062c7bbffcc6907527ce3e6fb82b9d7130a0e5c62b1789c6ce1ffbc180094801622f5ecbe2d08db2ada30d87da38195fa979b0fd3a349aba370ef622a74957a99b5530a3308c254187966e48308ef723b99015ae19ebe855ea83d0ca127192542f0cba0860104ac812bef67da66d6eeb02725b7dffcddd1e2d34a38678e6f038f3e50bfcea74f6b1171060dfb9702241177bc6da9530c1db20c74ff8d990c302ea0baeccc659f3f46d411a59c771e49300e9ed0d4847c5b1fa01f937948500dd6c2f0e21f1a266024d0cfa6fdd56900918c6ca789a76014965aff777bf2e004eead02f8c189ef71e8efd56ec6302c773a1703f05978c6d6ea025f6311495cb20f11200385e10d945be4017deb9cf706faf1e787b555caf90d3b38451fbf41d708ce53cc2b92f7314d8a47d4a855f1b841663a4b227d8026df9663ad3ef42406075daf22639f6cdd3ce78519cfc5c2b052b3d7008f25b37bf1de8e08242eecb1ab23d7909c87adfc5b9e93f55633d90bcc8a29eb18fc943b4f6f86a49fb3905a2553f9e0cf750f32e7d52cd7d1c2b13f1723dcc3e3313a03e3a77a61d34b4b4f5852ae15e0674f4c5d7ffaca7dd571a9d9495d81fed04791db0b948d21e430d64a51a500e98a7966d254860864fbc578a37af487e0b6c1bd2c298eb39f028f5ab8c37a25138e8c1bb65861f591a2ba8c409c3cfeaaec933e791a5450370bd0b7ffd4fbacd3bec4ce6d3c55b248e5fd351dd08763a5157e67b6bc9814bad5240cb487d8b071e2c930f4a864e59c1a68c1eb0a66af1202629c3309632f2133a39f362c12945cada09610a13fa376a741e9eaf51a54dc5872f00913f985d9470fb3232a6fd6dcf83d15f8e5c5899aee060fbbb9703a5205140aee4b5abbf5eab3ef2ec276d80811c7cf057047f44821499ae1c053cd841910a2a3c737474c773d4ae47a2e1fdca595527d4a8c0d7ac2bd86e869ad8fa4aefcadf49a8c9bf196fab49a94e9d393037cd8bdca737ee408d2f10d7009850db76c5c3a2c9ced86c40f54a6f43ab32f2011d32e22278a5aa12690c2653113782fac4e183b57ef9e9de2e92d0b78f9643a2bea128acff0d7554510b69ea5c0214009d46e7cdfcf0a98e3c4080eb2a68dcb75a348766395ea23d5c589112f6267d2075f9be41fe0e88c1f576efdf33838f1845b8c1868296f4daadda64a2c6c0d23749a98600450fcc359510b0af89035d9fccee40a91d522c05e0ab51aa2152c97f14a41213ae548dcb51ede1f85abdd49465195362ff301f7a30545590da9559848a755792d86f87c2740e890f2b75cf0e65d9a38e1070d1f279ffecb8abd45802197310b52b03c577468aabffa4a07529b483c888fd2cfca92c74ec47002d0273ebc48447f132284530844f750d8fa0cea442156f46eb037f3168883c81df45924058aa8940ac595f08ee3607b117ab76c09be12f5d5c51037bc328a8d77d9abdc06f5b707f1d5083b8f626b9f8f4a9ab6ec38e47534cac011974efc86935d5f88a1ccd73a0298797e8e89033642f0e3edbdb7fde9a193a3086fe3abfcae24cc3ffd65d078af2530059ab291e6f01ac1e1e1c6fe225d36f9f86721826e9db5b441a38b7c1f5caa46cd02828ddb2407f5c8e5e2b616c6ffa1aea01944ce97ae3fe5896af8654126b586e92167fd6a47062e5948952c942e4a560235f2e5cf1fcfe0ef7183beba5e1cd25aba6e9257b572a61a7d0684fd9e326730122afa5c5f1b6d8993973485cd83a9b189b5ac7824a7f6443c8048c7346c1f44c8a8b4d4e21aaf9e1b68ae40d5fd82e790b6a394c389bba15006b60edd831cd8e890f02fc0676550944abee76cbfd4d2412c5e108b468489c16925fbfab7f9390f7be09d46a6f6e108c5d20c08da24c89b79bfb5c37f32b6d3f45184a3cf0a30f3ca16be629d3205e91fed883f768c356b6ca550d850b6527835c140047a40bc295852183014a6405ea6cd2cf62abe0065d428fc693b579a29ef020970800c5623b1f032f60f5554da0296ff431ef91dae0c7cf799228b6191d321c49ed1932d234dc3fa9dcb90c6c95ce61957779b510d2e932ba90c9ec4fa0368e17abc1787656c83ceefa6bce73ba7ebcdca5351355f97c6c795957cf2cfc38a367d6088ff1a975ef2107d5f5bbd5a0731336bbd07d5bb5011c5c86849c6fc7fbb500d8d81b31b73e924e510ecaca2b6e26651ebc798e2daf7725bbf91d9241d7eb1ff771396b12f3e47ca02ccce408c48705db04e305044da9a30fb28480d348243fbf0bd5c5397a40ef774bd6f67ff172aa45dfd917eeb8175de96f028eee5b2987722bebff8e47efca457ac098027a6584009a317b8e7acb2f700df34d3eb97fd07b20cfcfc77864bf1dd246153e1aa82ef1e95596a04e126e3bd0d52c3a42a924b8eecc99aaaa1c3c92ff1421a8256f4946c45cf0a3ddecc7fad67c4ebaa2d035feebcd37bcc48efeab02a411950032847beaa0540808bb4b89caf9d527edb7f78f36a7a1e3f65078b1ed7eb2514b0ebf459ba5707f1a6083ec697e0d9ee358b897de2facb8a7fe1b6a7d9dd85b6ddc8226847e04563296bcaff9de331905524cd820de2833f3a12dfe543391da9eb026bb100c9333953e63e0e3f4d0707b0b48f9278e6e53526f549df0690f64e1a7fd6e38163ffe85b3dca98c4b41576cc9a478d369e819eabf8db2f2b3ad7d652726d5973db1e196fc5813e29152f7c225e5179092ef8562e53a9e809a506efe46211c04d86bca24af58ea8b118b2e895699d10026f6018677e58f9a62d404be3912e70fa496eeb82f27a1b9827135a86c1455095ae21227df372c00c0e8208a047c15054910c7835743774ea095322d093349de26c0573868b0a1d66a22441b1fa6896a176f705c89782ecb0bb1cf9b3827f217cf82b029f61a9059ff4c6f345ad16da7b118de7238c808ba1ed36673189efa9ddb4741452c028b23b45cf0f6aa87602d195a94ad4cf8fc2a516b344274b9b6adb98283559c13589cb9954483b1c618768344706faef5d93960300a19e280d58969cd7e91d404ea745777b07dd1e860f162979890107a87d085f48568851e970e0350a4c5129d84e0c699177ec701e9fb96963d2e06f4ed22016d99923d052cf2c911e60b1327a3c082917da1349b79ab1814af18e36054912850302e46ac3ed30e33dede8375a1625285ec9b2c6daf8685e85cdd564f45204dffa1a05a809de5d410882c427516be64dfb0da5bfa1d9f74c60e69a6a4817702a564ee3fd7945503c21a8c991b7842ecb3d63fe57fec4f08735f9df0f0f10ca7baef406958bc3bdf6edd6c71e4caaccbb4d499f794899bf1e34ffc90b5cc84f8db4aa7ee3abd08cffd51e426fee67bdda2b64302ba545c1d399ce4d8887dd7aa58789c3b48a548223beb6e8a19737612bb9ee79c0804548ec0ff154d84fec9a8717c02caaa083f1a968a39bd0fcfba616093358e402fa4a237e5e329f38179b0361522c7c0287869e9e9ac83a3e45632654e408fac3e4331c89799e7bdb4ef02d9fe4645ac6fe29431ff6fa59653073ea5b657541b437c84efc9db36965733b44947128044fe41760a4b4118f5cfdf70bbfde8c1778475509f3438842d002849926906732dfb4496754d854f353ee44c07649e0027e639ebf17a4ab43ad5fab4225c43533a8846311a9b3ed41df0b2f4c844f3bc7f5d054ba6f135b0e8326b42fde1ddcd4172af5b491cb8ad318c37a73df66a4e77a4d5783f59db5d54c9f12cad3def6bf4d124dece6292fe69e17d24198dd36ea9f0566100ad243793d49149782eb68696a6df9bcf052c17d8a7b226986727892ad82299ae44d732ba39212596a208ef45eee826258c81f6828f3a0ef5bac6e9e036abbcda5898a25cdd44873c7f30c16535a810b05a6c9ed2320b66b257d02fa69ed27a2cc110ea2c66d8fcc40e3b76ec2a46cc29b5dc78bb771dcccbc80e136a3f94d8b43951350518d14c094e3beeee694e8736ab475f27ee82bac6339da2ecd81358458d31e6a3c767357c35aa4a3ffaf56ccad0febf569d287fa0bd89b003c10e2e8df8f28d1a3e3eb196689f735a653216", &(0x7f0000000000)=""/52}, 0x20) 19:20:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x1200000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01030000000000458d9806"], 0x14}}, 0x0) 19:20:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0x0, 0x40040002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={&(0x7f0000000000)="e9826b78030a02b1d19824942b459389b55d69752a5cb349a80319701ed4efa559542135c446b41fdee88388b354bddf744e2db0e7fd3ac73e9bae125654d27b5b47b8237af67aad78d29255aa332892053bb79260868a74f9daa379", &(0x7f0000000080)=""/53, &(0x7f00000001c0)="6890b0ce11a8b7f726a103b4d504493e76c077d24833a125e4f37e0e4c1e96637d2735a72c09704505ce52064f529829757692c185803eb74986b214b8930c70416af2083d2d30b552da0b894a1cf4a242674b576c54786cfb9e56db92bac7a7c3424f0fff4ed84ecd2cc79f3349e8ffb4a8c28dbb5d9ac6d13a81564a096bf7c4369db5e2879fcde5356a5dc8a5fe1b41ef2e1716ea3bb67d6720692f9ad91cc8c674c16a7e4b882fa8418a5ab7880ff1a79a5d89efa7e57b5ab2ea4e2d12289d73480bad87a8d85850adf630719bc6164e3c2f768fa076e9b7454415395213e077fce73b9230786ba7020ace9a13a48fe5ea07837f867b3001", &(0x7f00000000c0)="bb", 0x6, r1, 0x4}, 0x38) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x3f00000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1a, 0x0, 0x40002, 0x3, 0x2b, 0xffffffffffffffff, 0xfffffffd}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x2, 0x45, 0x1d, @private2, @remote, 0x1, 0x7, 0x717, 0xfff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000480)={'syztnl1\x00', r2, 0x20, 0x7, 0x2, 0xbd91, {{0x8, 0x4, 0x2, 0x1d, 0x20, 0x66, 0x0, 0x3f, 0x2f, 0x0, @private=0xa010101, @multicast2, {[@noop, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r1, 0x10, &(0x7f0000000640)={&(0x7f0000000580)=""/148, 0x94, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x7, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xa, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x9c}]}, &(0x7f00000003c0)='GPL\x00', 0xffff, 0x60, &(0x7f0000000400)=""/96, 0x40f00, 0x0, '\x00', r3, 0x19, r4, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x4, 0x8, 0x845}, 0x10, r5}, 0x78) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/seq/clients\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x7844}, [@generic={0xda, 0x8, 0x0, 0x9, 0x7ff}, @call={0x85, 0x0, 0x0, 0x69}, @exit, @exit, @jmp={0x5, 0x1, 0x5, 0x8, 0xa, 0xfffffffffffffffe, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f}, @map={0x18, 0x4, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x81, 0x40, &(0x7f00000000c0)=""/64, 0x41100, 0x0, '\x00', r2, 0x19, r6, 0x8, &(0x7f0000000280)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x1, 0x9, 0x7}, 0x10, 0xffffffffffffffff}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:41 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000009f80), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000180), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x3, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "2aa38eb37d0c1653"}}, 0x48}}, 0x0) 19:20:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xafb6, 0x0, 0x0, 0x0, 0x8}, [@map={0x18, 0xb, 0x1, 0x0, r0}, @alu={0x0, 0x1, 0x5, 0x5, 0x4, 0xfffffffffffffffc, 0x6f30683b3a30542b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x1000, &(0x7f00000011c0)=""/4096, 0x40f00, 0x1c, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0xd, 0x80000000, 0x3f}, 0x10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x5}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000031c0)=""/4104}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000340)="083a4e16629c62f662415bf39ea42cda79d763f0cb5120555c860844868f8d5e5f75ac8dab585fa62026690d1f9221bdf6792d8d5a7a1e2f698ec5d8aa0e3efe46e67cc81474d6f6237025b179ea1eb64ec92936a2fbf373c81e8dea7b642db592ee017d0345994240ef4759ccd2ad6f2d550828199ff3f23d58ecf22d78b853a2f68f5af7d53ca078c901924205ee9ee3b5c17c21d9cb475d8bd3fa2db59f464a9fa9810e85ef9e", &(0x7f0000000400)=""/246, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x13, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x0, 0x1, 0x9, 0xa, 0x18, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x2b, 0xe2, &(0x7f00000001c0)=""/226, 0x41000, 0x15, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0x7, 0x1ff, 0xfffffff8}, 0x10}, 0x78) 19:20:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfc00000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:42 executing program 1: socketpair(0x27, 0x0, 0x0, &(0x7f0000001700)) 19:20:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0xcf2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x410040, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x14, 0x3, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x0, 0x1, 0x2, 0x1, 0x4, 0x1, 0x1}, @alu={0x4, 0x0, 0x9, 0x5, 0x5, 0x40, 0x10}], &(0x7f0000000040)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x19, r1, 0x8, &(0x7f00000000c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x6, 0x9, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x3, 0x9e1d, 0x80, 0x80, r0, 0x1, '\x00', 0x0, r1, 0x0, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, &(0x7f00000031c0)=""/102399}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000040)="aeb5b59fd1b11777e4c3ff37dcb75d3661e654ceb424626d4e54b3abd1a174859a2434e50aedd0198c9810735342d333cf38545065d4d61532219a63c6ccc100", &(0x7f00000000c0)=""/44, 0x4}, 0x20) preadv(r0, &(0x7f0000001280)=[{&(0x7f00000001c0)=""/133, 0x65}, {&(0x7f0000001200)=""/73}], 0x1, 0x6, 0xa2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff33a70e4dc4193cac18e78551e6ae5dc926959b167fc09e23ec3679d818a05d29fe4df3f31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb58b070440dcff74c4c00b0e13212a55db69f2a6bdc6f9baf4ca444f46ac0af3f519cb8ce0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b2a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1dee58e7ef72e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a0142d3a0cfbef22b1a264c62328e5f93aa752b9780f51b079312eec1c06917a4b9aba"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f00000002c0)={0x5f6, {0x1, 0x20, 0x100000000, 0xff, 0x7}}) 19:20:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x0, 0x40002, 0x2, 0x360}, 0x40) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r1, @ANYRES32=r1, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000740)={r0, 0x7, 0x10001, 0x8}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0x84}, @call={0x85, 0x0, 0x0, 0x3d}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x30, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x62}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x400}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x10000}]}, &(0x7f00000006c0)='GPL\x00', 0x20, 0x28, &(0x7f0000000700)=""/40, 0x40f00, 0x12, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000780)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x3, 0xfffffffe, 0xdef}, 0x10}, 0x78) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x13, 0x7fffffff, 0x200, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x5, 0x4}, 0x40) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000480)="8120c429b29fbb990e84e01809d16c78d4af34e22f6d170424022decfee321c06463ea70e6603bd4297c9b4e0e0878d06ba82821e576b50a908878942dfba74f85d48e9e42e9fb6a4645163c25591a909c0dd8b72e9adf2bffe1a003c7e2f6cbda44d22bd2250d1842e71441d5311aa8c64d99085aaef3329548278b7ebcff8d70"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000080)={r7, 0x0, &(0x7f00000021c0)=""/4080, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockopt$IPT_SO_GET_REVISION_MATCH(r7, 0x0, 0x42, &(0x7f0000000540)={'TPROXY\x00'}, &(0x7f0000000580)=0x1e) getsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000000440)={@dev, @loopback, 0x0}, &(0x7f00000001c0)=0xc) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r7, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/145, 0x91, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1c, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0xa, 0x1, 0x8, 0x0, 0xfffffffffffffff0}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}]}, &(0x7f00000000c0)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x2, '\x00', r8, 0x1a, r7, 0x8, &(0x7f0000000200)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x3, 0x3, 0x1}, 0x10, r9, r7}, 0x78) 19:20:42 executing program 1: syz_mount_image$f2fs(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0xf00, 0x100}], 0x0, &(0x7f0000001580)={[{@noinline_dentry}], [{@obj_type={'obj_type', 0x3d, '\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 19:20:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfe80000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r2, 0xf, r3, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r4, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x17, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x3, 0xffffffffffffff78, 0xfffffffffffffff0}, @generic={0xae, 0x8, 0x1, 0x7ff, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0xb46727741f71762d, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x2, 0x8, 0x100}, 0x10, r4}, 0x78) 19:20:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 19:20:42 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000280)=r0) 19:20:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x98, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x3, 0x10}}, @IFLA_VLAN_ID={0x6, 0x1, 0x4}, @IFLA_VLAN_INGRESS_QOS={0x58, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x2e6a}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x400}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000000, 0x1}}]}, @IFLA_VLAN_ID={0x6, 0x1, 0x3}, @IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0xd8}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r8, @ANYRES32=r8, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x2, 0x7fcca6a, 0x201, 0x1882, 0xffffffffffffffff, 0xfffff995, '\x00', r8, 0xffffffffffffffff, 0x3, 0x2, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfec0000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40000, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x1, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f00000001c0)="c567cc1081d547956965fba20b03cef0348123f13476794a68dc5dd04186bfc739717f0b8b569dee9c5f1a874581672eff45a0db82f8c5f45d0685b37efec0aad8cc3fd3aa9cb546acdeb5b4b2c727407d51b69894cb8dbc145905c662d1d67a4be68e283429b2401d7017c62de51e30d83bac2c1aa03d633b0504ceda9155edd13fb7afd96e1af8c3650a6c53e9ad6f9a769158fdb261e29cb55a8e4dbcdc72dac094ba868f14010a99dc62118898b907bd3118fb0c00108517c1ff257d6cd8948d883b9981b94ce2e59170544911766719c22ec7b5141ece8bc1c406d8", &(0x7f0000000040)=""/132, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r1, &(0x7f00000002c0), &(0x7f0000000300)=""/85}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:20:42 executing program 1: socketpair(0x2c, 0x3, 0x6808, &(0x7f0000000000)) 19:20:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x10000, 0x2, 0x0, 0xffffffffffffffff, 0xfffff5e8, '\x00', 0x0, r0, 0x0, 0x1000000, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x101000, 0xa8) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=r5, @ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94340}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x60, 0x10, 0x401, 0x4, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x20, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x5}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x60}, 0x1, 0x0, 0x0, 0xc004}, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r9, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000080)=@raw=[@alu={0x0, 0x0, 0x8, 0x7, 0x4, 0xfffffffffffffff0, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x3c}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x53, 0x4, 0x0, 0x9, 0x683c}, @map={0x18, 0x3, 0x1, 0x0, r1}, @map={0x18, 0xa, 0x1, 0x0, r2}, @map={0x18, 0x2, 0x1, 0x0, r3}], &(0x7f0000000140)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x1d, '\x00', r5, 0x1b, r9, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x3, 0x1000, 0x3f}, 0x10}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getqdisc={0x2c, 0x26, 0x800, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x10, 0xffff}, {0xf}, {0xb, 0x5}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x404c080) 19:20:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x40}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000980)=ANY=[@ANYBLOB="020300030f0000000000000000000000010009000000000005000600000000000a0000000000000000000000000000000000000000000001000000000000000002000100000000000000020b0000000005000500000010000a"], 0x78}, 0x1, 0x7}, 0x0) 19:20:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040), 0x2) 19:20:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r1, &(0x7f0000000000)="d6fb1dbbd27e582f675c00cb4301744a21f303f8a30dabc84081ce4abceccc96e5d7726cd1474b32a6bda099cf19e47c17e5aaba7e363be1a3b031e9bb0f5399121104a74d8810f91dec7c41c4babd3e7ee28f45453a8bbfe5df1f79d0a56f6d860ea4cc74642a21b05923d4934b98", &(0x7f0000000080)=""/61}, 0x20) 19:20:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xffffffff00000000}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="9cd13932dc938994f7742acedd94e426cf5dd4681a0b227612e76b32ba79b4f4cc478a88a22aba3a15cb12423b428eb071274855095f87d7890b11d3e0a269e271e982310c9d4849946d483ec1ef69982fbb5964093593e88609736fa69182aca7fb9855c033257aeab38ee69df9fa2967de0ac189da729ff751f65a9f0f5b217f8988b1f56be5a8d79cfcc3a2e0b0c261900055599d81accca8d5b080b2aa71f7df9edcdd4a2a05be29fb5c7cc2b87abee8f5bb0cc52767be", &(0x7f00000001c0)=""/142, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x6, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@alu={0x7, 0x0, 0x9, 0x6, 0xb, 0xffffffffffffff40, 0x10}, @generic={0x80, 0x5, 0x1, 0x101, 0x81}, @func]}, &(0x7f0000000380)='GPL\x00', 0x80, 0x5b, &(0x7f00000003c0)=""/91, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x3, 0x5, 0x5, 0x2}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x5, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000280)='GPL\x00', 0x9ef2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x16, r1, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0xf, 0x7fff, 0x7ff}, 0x10, 0x0, r2}, 0x78) 19:20:43 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0), 0x80, 0x0) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) r1 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r1, &(0x7f0000000380)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/251, 0xfb}], 0x2, &(0x7f00000002c0)=""/161, 0xa1}, 0x2000) 19:20:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000980)=@newlink={0x134, 0x10, 0x401, 0x0, 0x80, {}, [@IFLA_VFINFO_LIST={0x104, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x4}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x1}}]}, {0xe4, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x2c, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x8000, 0x6dc, 0x200, 0x8100}}, {0x14, 0x1, {0x2, 0xdb7, 0x400, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x4, 0xfffffffffffffff7}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x101, 0xffffffff}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xc1, 0x80000001}}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0x1, 0xeb06}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffeffff, 0x2}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1, 0x430, 0x3f, 0x8100}}, {0x14, 0x1, {0x66b1f52e, 0xb9f, 0x8, 0x4080}}, {0x14, 0x1, {0x65, 0x61d, 0x1, 0x88a8}}, {0x14, 0x1, {0xfff, 0xae2, 0xf7c, 0x88a8}}]}, @IFLA_VF_TRUST={0xc, 0x9, {0x1000}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x5, 0x4}}]}]}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x134}}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000840)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000400)=""/80, 0x50}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000480)=""/206, 0xce}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/162, 0xa2}, {&(0x7f00000006c0)=""/101, 0x65}, {&(0x7f00000002c0)}, {&(0x7f0000000640)=""/16, 0x10}, {&(0x7f0000000740)=""/47, 0x2f}], 0x9, &(0x7f00000008c0)=""/172, 0xac}, 0x121) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@newneigh={0x44, 0x1c, 0x1, 0x70bd27, 0x25dfdbff, {0x1c, 0x0, 0x0, r6, 0x80, 0x87}, [@NDA_DST_IPV4={0x8, 0x1, @rand_addr=0x64010101}, @NDA_PORT={0x6, 0x6, 0x4e24}, @NDA_VLAN={0x6}, @NDA_PROBES={0x8, 0x4, 0x80000000}, @NDA_PORT={0x6, 0x6, 0x4e22}]}, 0x44}}, 0x804) 19:20:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1c, 0x8, 0x2, 0x81, 0x12, r0, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000740)={'ip6_vti0\x00', &(0x7f00000006c0)={'syztnl0\x00', 0x0, 0x2f, 0x31, 0x0, 0x8, 0x30, @remote, @private1, 0x8, 0x8, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f0000000240)={'ip6gre0\x00', r1, 0x4, 0xbb, 0x20, 0x7e, 0x8, @remote, @remote, 0x8000, 0x8000, 0x81, 0x8}}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0xfff}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x27, &(0x7f0000000080)=""/39, 0x41100, 0x1, '\x00', r2, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x4, 0x7a836166, 0x8001}, 0x10, 0x0, r3}, 0x78) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x9, 0x9842], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000b80)={'syztnl1\x00', &(0x7f0000000b00)={'syztnl1\x00', r1, 0x29, 0x7, 0x8, 0xf4, 0x40, @loopback, @empty, 0x10, 0x7800, 0xa3, 0x4}}) sendmsg$xdp(r4, &(0x7f0000001140)={&(0x7f0000000bc0)={0x2c, 0xd, r5, 0x3c}, 0x10, &(0x7f00000010c0)=[{&(0x7f0000000c00)="61da9ac69a528cacf463ac9b54344ee27f29263b4473763301e59f5bdfb57c23b82955edd069d36ed59bce9d8636847369de2a4b498c676af25b49cd14ec5e934cd32c57f10ea70b2530b9c0394e330a8d392486d0b15e4813b89534e51a3d7b4b725fce7d7676924e48e4fa85e83797d994436a0b11b3d271e2b73338cd006b8adfabaccce2e0bee7a577e4a927d4bc1373e5611509e165074b1cbfc6b3b5542e5c886208c7a1898cfdb017b63900f4f562d93f0d474eaf9e37da5c23905c1d", 0xc0}, {&(0x7f0000000cc0)="b8c07f8ac314ff26fa0a0aa09589a9", 0xf}, {&(0x7f0000000d00)="37d77e6e473458514e28daab825f3815a057fac96afddf02e13778aed33e242915796c6354a3dfab05a8808b1af2931528516c183a4c30019e9480e5b3dfec0032d151c9174cf918b47ac1df2912e05f128bc8e0f88cde8ff56245070cfcd92b5ee89acebfd071c8fe3c2e1dff4f2556398ee0da1082dff14172a32ae8e98a4b434952378f955dec52ea208002dd3a3b4b4417", 0x93}, {&(0x7f0000000dc0)="24b4d430337c502a4a3be37982e088e7e1096e3f94aefe19c005829932c3fdf3b529bf2ce404c0fa75e02d1eecb339d5a87ecfaa4ae0679f3ac48125c706ddf34c7b92c044e74444d5ac19abf7b3fac81f6e2cbe2b0e3add54aa71f57a42a90d9a3be056903829ccf0f42822829f1a57e52bc0e9dae45f75c58116c41ef9481d3aaf1e5b5a8c4fa92c364b121d2957baa0ff2e5143a8218cb2c88d9428b06a86a38751b2f77e41656f2d0c32e39ace27abc24a064f1afa35b718550f7939f853cec9f2d9ce5e3fac0821a11f731ed26320d1281b204a07a8e6a58a92a5ad3539d5", 0xe1}, {&(0x7f0000000ec0)="d4ffe8134b1f08821aca49a07fd47c02d3", 0x11}, {&(0x7f0000000f00)="84dcd8ef3eb6e42aea923a346a4aa63e21adb27e46fc8fbdc0da31f7e95dd23dfab30e524e1eae266e188ee2a972d84a634c6ced8c8e0dcb07a1885379b83117ec838739431d6df90ff6b2d9378404ee6feb22ca39809c11d866b90e0bb74612c14c23acfa4097f54d07a6c398c051a5e9665d44665df9dd46673b4be16fe4d599d2d5e70a2716fe010d007dfd4dc9c08bce637bcb6a1508e4ee64728ab614b1b2f3d7d49e1bd96e70d9ff2347a681", 0xaf}, {&(0x7f0000000fc0)="163d32608bc7a934e36f75328df925eeb7d047e3c1c831b663e090f8068bc8eff0d47ec16e51a51cf2cc8450be77c2a9799ce9de1bb2660209a1c9f3892bd1fb1ff7f6fa5014e4db459a9deff17b287470749b54177aa21e69fde7875db2afb6ae29b95603dd439e0cfc14945d879d33387a5e3e896d4cb63c76fff559ac69589ca9210eee20ee6c55bc00a8c2fda09dda4dc89c10ecbc49142b7d62a1bc632fcdda70d3b2cae662e1d25a3a613e29ba3039b99b61c1c6ad97ec8a5ce1904ea5c5a68c822879ffbb473a7196da11aa6b0090086450ae0605941f50a16959b6c6f1c19a43fdbe7dd0b74b5e65ec03840df32b82a95e618376af", 0xf9}], 0x7, 0x0, 0x0, 0x14001}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={&(0x7f0000000200)="575df039b45ba5d9fa3c58cfa9e30a309f8c", &(0x7f0000000240)=""/207, &(0x7f0000000340)="2a4289834d4a50a455e5daad108f95972d43c2ac3984100f0a8e6a37dc394aa0826555e51413470f3a80c8403d35d831553fda12c9d193b5750a52b0cd15479b728c9f57acaa78e55a0b1e718f4604b1fbc87af02c75cb88fcea29e1b069d1883c417b8f8b9393c3237dff5541c67cc69b0010889b8096a37f0b277739883ee2ed332f2adb57c11905e3f578cc6901a5ec58982efb7989f19ed320a3963ebee29cfb6f51055aade955012ac50133e7ceb122964247c0dcb181eed1188aea0eac36464d93cea0df91181d4ea9863700f682e889289fe5de66de0b7d3c2adcfdb2507e8cc040afed8eb46e449be81d54ea53ba33396dc6d06f", &(0x7f00000011c0)="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", 0x1, r0}, 0x38) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = dup2(r0, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="165861b8fad56419ba9606196bac963d535c8e24e8d32fb8e68cd30de7a03dea307df55d09051feb8c6f203ef248b95844b130caceec5ffb01e22efdec45595704e670d664bde97099d8e4de5212336f76a31bd60486163160061725abf1f2f0ec78614e46d56b0a5583ad7a93e52fc47146639af709a2d48a994e1a66090eea3fceed2a0826a1371ef6e505a722f1a605538f6b11925b1b385da93162df9fcd19f3d14865a7019b2fa49bfa03950099a3d156935d968cc7552efa52e875551ac63d67e28b7477aa9a407d8ea9523e", &(0x7f0000000140)=@tcp6=r2, 0x2}, 0x20) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={0x0, @can={0x1d, 0x0}, @sco={0x1f, @none}, @rc={0x1f, @any, 0x4}, 0x7, 0x0, 0x0, 0x0, 0xffff, &(0x7f0000000480)='virt_wifi0\x00', 0x8, 0x5, 0x6}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@typedef={0xb, 0x0, 0x0, 0x8, 0x4}, @const={0xb, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x61]}}, &(0x7f0000000580)=""/242, 0x33, 0xf2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0x1a, 0x1, 0x3, 0x1, 0x18, r0, 0x780, '\x00', r3, r4, 0x3, 0x3, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 496.763114][T24972] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 496.800473][T24972] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 19:20:43 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x7ff, 0x480801) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) recvmmsg$unix(r0, &(0x7f0000000e40)=[{{&(0x7f0000000040), 0x6e, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1}}, {{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/69, 0x45}], 0x1}}, {{&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/101, 0x65}, {&(0x7f00000004c0)=""/67, 0x43}], 0x4, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000000680)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000700)=""/44, 0x2c}, {&(0x7f0000000740)=""/107, 0x6b}, {&(0x7f00000007c0)=""/105, 0x69}, {&(0x7f00000031c0)=""/4096, 0x1000}], 0x4, &(0x7f0000000880)=[@rights={{0x10}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f00000009c0)=""/74, 0x4a}, {&(0x7f0000000a40)=""/116, 0x74}, {&(0x7f0000000ac0)=""/37, 0x25}, {&(0x7f0000000b00)=""/242, 0xf2}], 0x4, &(0x7f0000000c40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d40)=""/131, 0x83}], 0x1}}], 0x6, 0x40000040, 0x0) write$UHID_CREATE(r2, &(0x7f00000041c0)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000fc0)=""/231, 0xe7, 0x7, 0x7fff, 0x2b, 0x3, 0x400}}, 0x120) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:43 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x4c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000011c0)=""/4094}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r2 = socket$nl_rdma(0x10, 0x3, 0x14) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x1, r2, &(0x7f0000000280)="0a9cc3a932282a277fa5036fa5d87a4f6104ee37d132ad79a0ccb5b01e6d8605bbd944e9d2034eee9a01fc2c19cb030e21dc3d89b4", 0x29, 0xddc, 0x0, 0x2}, &(0x7f0000000300)) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000340)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="05c62863b2a9d1a73577db5a534165a83f53ab9931a2aa3e75d15cc1079e4052f4eb42565647c3bd077e29bbe8bb0d1da81ff518113d90c1394be7aa421125993b1f0b9054fd9c5c20964b1d007882ecdb3976364859229bf7a4804a5d99db445cf813c43ba896918d9ef0ad4ae03d5e17598c1e153057508f590ed881b955dd3e0034de073d0db52faaefcf63535befa6d72dab1fba37c83c84bb60a0e1bc378178990f1f8e3000836030eb82286d3c695156ee78bab48d3ed66ce28c749850c3351b6286603cb3f46f", &(0x7f00000001c0)=""/141}, 0x20) 19:20:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x4}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000003b00)={0x0, 0x0, &(0x7f0000003ac0)={&(0x7f0000003940)={0x2, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1}]}, 0x18}}, 0x0) 19:20:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r2, 0xf, r3, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r4, r1}, 0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd1cb, 0x0, 0x0, 0x0, 0x7f}, [@jmp={0x5, 0x0, 0x0, 0x3, 0xa, 0x0, 0xfffffffffffffffc}, @exit]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000080)=""/85, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x7, 0x3}, 0x10, r4, r5}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=""/121, 0x79, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x13, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x8, 0x4, 0x2, 0x62b1, 0x2}, @generic={0x2e, 0x4, 0x2, 0x2, 0xffffffc0}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x6d, &(0x7f0000000080)=""/109, 0x41100, 0xa, '\x00', 0x0, 0x1e, r0, 0x8, &(0x7f0000000140)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x6, 0x8, 0x4}, 0x10, r1}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x5}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x6}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000640), 0x105000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0x1, &(0x7f0000000480)="bb89f26cf9818b7f0989afb17afbfafb909a5a2696259b563d6d0f75ef4eb4992366a5068fbcf2ec545214b3b97296f6d4ac3097c7c395975339d05e581e9253ec40ddfa4fafd0160d", &(0x7f00000003c0)=@tcp6=r2, 0x4}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000440)={'wg1\x00', {0x2, 0x0, @local}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r4, &(0x7f00000001c0)="fac9d011607773f9bd43d8d4c4eea954c7842cbce01d8c6ce4d988dd0661c0e2cc15ce826c07421b11f5ba8bef89499e895e869c1d8fa0753750601063a142dfb6ed4e57b825ef84f6c2e4b94368f90336f88f042845612914c583b9e2ed50121ee9c3c1912880a3cb1bb70625c61fa392ca68b0bb3bc5d134b34b6bffe21bf765bd95fe8870bc02c0ba13df48c2785aac6546ce140905a8a4278075a6f8bcd90ed36b51a037b6e808c3a0fc68cb62dfc95f096dddbf0804604e87f90baf1f990a7c94d725", &(0x7f0000000080)=""/111}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) accept$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r4, &(0x7f00000002c0), &(0x7f0000000300)=""/103}, 0x20) 19:20:44 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_80211_inject_frame(0x0, 0x0, 0x0) 19:20:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="9f30b4f62396647057e158f9", &(0x7f0000000040)=@tcp6, 0x4}, 0x20) 19:20:44 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @fixed, 0x400}, 0xe) 19:20:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000012c0)={&(0x7f0000001140)=[0x7fffffff, 0x1f, 0x10001, 0x6, 0x37e], 0x5, 0x315c4875, 0x2, 0x80000000, 0x6, 0x5, 0x9, {0x2, 0x3, 0x40, 0x0, 0x60d, 0x9, 0x2, 0x8000, 0x372a, 0x9, 0xa00, 0x800, 0xff, 0x9, "19721e810ce706668ae5b6cd77a511d59eb2e24a2c6d6b9b95ad23a1d25ebd02"}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1c, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xffffffff}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000140)="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", &(0x7f0000000040)=""/48, 0x4}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f00000011c0)="1db6782b04aefa4d85a7db39026f830d43e2a1d1e9cf0c6a7d0f0f1bc0b6b5ef6c33ecc4f38f1db88c5abae07147c57c79829469a65b53667f9c99f987c2074c51a13cb6db3837fe6668c4f216045095a0d442390d739f332f240d37163f07f7ccfc332a593c6504552625b7f7dcceb3b06e2ea0be196336a2e049baa2805483eb16527d12c902d889b6c5c6dfa55eed9a49b8cddee65f423e3112f3114e8daa530129ba691a45adfda45af0e2c01e24c535bdd4063dc1450c3be3ffa7ed623b2e884aab63a218bfeaa3c1bf6fb14c9df4ae4265dba9cb07f8", &(0x7f000001c1c0)=@buf="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"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r1, 0x0, &(0x7f00000031c0)=""/102400, 0x4}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001580)={'sit0\x00', &(0x7f0000001500)={'ip6_vti0\x00', 0x0, 0x29, 0x2, 0x0, 0x1, 0x30, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x7800, 0x80, 0x7, 0x4}}) bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x0, 0x9, &(0x7f0000001340)=ANY=[@ANYBLOB="18000000030000000000000077060000851000000700000018250000", @ANYRES32=r1, @ANYBLOB="0000000000100000298580000100000018110000", @ANYRES32=r2, @ANYBLOB="00000000000095000000000000000000"], &(0x7f00000013c0)='GPL\x00', 0x7, 0xd8, &(0x7f0000001400)=""/216, 0x41000, 0x4, '\x00', r3, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000001600)={0x0, 0x9, 0x2, 0x40}, 0x10}, 0x78) [ 497.561604][T25021] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 497.598193][T25021] netlink: 'syz-executor.3': attribute type 11 has an invalid length. 19:20:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:44 executing program 5: accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xffffffff, 0x0, 0xfffffffe}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f00000011c0)="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", &(0x7f0000000000)=""/255, 0x4}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0x1, &(0x7f0000000000)="2ac035060ffb938d20e244d7dcd2b3e2533bbc98f869841594a75831d83219d95e7af0005932f826d7c29d1b15918be5060e775cd383e822ec2aa4abbd15fe39dfcb8592acc124591f1e4f1494965b860b5dc844d191db6b693c1a3a0a75176e49947731e2b9419b4275d3b8a13af62e6bdd526b1986d2f18263f461126181a9372b3cdde8c54d4b7ed40a6269db569c71190b7f4a399f5ba178f0b4379fe804f5680b03cacdcb5126e0255a93915edb50ccd97ca39734d96ae5f90654442480f6485b173daf798fa62d71d3797fa874b552206b42a365f9d1", &(0x7f00000001c0)=""/106}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x4, 0x40, 0x20, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, 0x8000, 0x8000, 0x7fffffff, 0x7}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x90, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x240a3070ce2e7542}, 0x48001) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000ac0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f00000008c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000000000000000090000000c00018008000100", @ANYRES32=r6, @ANYBLOB="c3f880921322d560e1d04b3faabb616b52a4128f085d7aa559b720bf0012edc2b6da271d8662346b00afaa1333d43f59d3e42a19e44435e5104f8d982b0f83a29a08ff871dda7b018ec60816525dbb7ace27f53cf2138906bb3695502a591e9424be88d69b2384e100286187c3a6d3d22f44416e9b9809d0fb8e4b8457c16c2cd24f46d1c87558d95c7bb6a462c4b6182eb515502bc56c6840210875121cbd606efc90bf1f785872263bd0b9c2b3bfbd2b3ee1abae5e7003d891ea201edca7d3156499108002ba9e41c7be9fee590d0f0aa2d8b493bd5ec38040ca239f00db91ee1dc6594b8e9c0c8c1207127b7fe709f0"], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000840)={&(0x7f0000000480)={0x3b4, r3, 0x138, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_WOL_MODES={0x3a0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x277e78f7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '@%*!\'-\x87'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x800}, @ETHTOOL_A_BITSET_BITS={0x1a8, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb5}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x75}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa36}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x16, 0x4, "89b7eae9061cfde3d18febe5976f3f44b025"}, @ETHTOOL_A_BITSET_VALUE={0x2f, 0x4, "96708fb7b9317d139ea5bc1f75acff607b28724e2738bd7557e5d1eeadb930eae86cba58568737203ff7ac"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x67, 0x4, "da714aae70a484fc45aba26e1367597eadbd67eb381089b93ff670c5d11c01784202efaa8a1001aedcca94ad25b85d53d3cb6c06112f1de873b459eb96e8aa8dbebbf55a47290d50ca8f75615667dd6e30a96a5f1c5357139c425303e2f05f4574633c"}, @ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '}\b\xa1/]-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ':--*$#+/!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xa1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x4}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x2c, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}]}, 0x3b4}, 0x1, 0x0, 0x0, 0x800}, 0x20004001) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 497.716241][T25029] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 19:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket(0x11, 0x2, 0x1) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x40000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1e, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@exit]}, &(0x7f0000000040)='GPL\x00', 0x9, 0x1, &(0x7f0000000080)=""/1, 0x41100, 0x2, '\x00', r2, 0x6, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x10001, 0x36a}, 0x10, 0xffffffffffffffff, r6}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x54, r2, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x2}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x6}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x20000805) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, r1, 0xa}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x300}}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x3ff, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r2, &(0x7f0000000380)="4d93ed5f969182261690accc4b85e24b92ab2f4d69b86c5b9464653a554564b4d3301419fa40e9926c8fd932a4d928defcd4f40b7bf382789fc0e5fa530579984ff5257ff078a3177c07d420aa67", &(0x7f0000000400)=""/64, 0x4}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)={0x11, 0xff, 0x7, 0x2, 0x800, 0xffffffffffffffff, 0xbf1, '\x00', 0x0, r3, 0x3, 0x4, 0x2}, 0x40) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r1, r0}, 0xc) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="00e700000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r5, 0xf, r6, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r7, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x1, &(0x7f0000000000)=@raw=[@generic={0x0, 0x3, 0xe, 0x6, 0xfffffffd}], &(0x7f0000000080)='GPL\x00', 0x8, 0x79, &(0x7f00000001c0)=""/121, 0x40f00, 0x4, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0xb, 0x6, 0x2}, 0x10, r7}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:44 executing program 1: syz_mount_image$qnx4(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000001a00)=[{0x0}], 0x2, &(0x7f0000001b00)) 19:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x81, 0x1008}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000000)="52ba599e5fc66fadfd00752cf37be69d3cd77424df9d", &(0x7f0000000040)}, 0x20) 19:20:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x7, 0xfff, 0x58, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x15}, 0x1, 0x7, 0x5, 0x1}}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x17, 0x3, &(0x7f0000000000)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r0}, @ldst={0x2, 0x3, 0x2, 0x6, 0xc, 0x18}], &(0x7f0000000040)='syzkaller\x00', 0x9, 0xcb, &(0x7f00000001c0)=""/203, 0x40f00, 0x1, '\x00', r1, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xb, 0x866, 0xdc38}, 0x10}, 0x78) 19:20:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0)={0xb}, 0x1) clock_gettime(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0xfef4, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x9, @loopback}, 0x1c) 19:20:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = fsmount(0xffffffffffffffff, 0x0, 0x80) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r1, 0x0, &(0x7f0000033740)=""/102383}, 0x20) 19:20:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:44 executing program 5: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x98, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x5, 0x10, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300), 0x0) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0xfef4, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0xfec0ffff, @loopback}, 0x1c) 19:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = dup2(r0, r0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x13, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0xa4}, @alu={0x7, 0x0, 0xd, 0x7, 0x9, 0xffffffffffffff10, 0xfffffffffffffffc}, @ldst={0x2, 0x0, 0x0, 0x4, 0x3, 0x40, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x8, 0x1000, &(0x7f00000011c0)=""/4096, 0x0, 0x1, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0x3, 0x0, 0xc8}, 0x10, 0xffffffffffffffff, r1}, 0x78) 19:20:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000011c0)="662f13bc6072d6618d5ac448aa015af4b36346d62d3ed90dc17b31a234f45a860d4f2832c9f4be9b08fd418769a0a7d39d0221c0acb3f73f66246c374e77ebdd402b96aac55b96c01672c41beef53d466fc179c37a37f2100338c391889d7c4f489cf616959141324e7d87359b72b3102100d6a8a7e439e97c40730092f997be69310f610e15670168ed730c133382714ef92912c13abbede67dc42b31cc803729706c3a763ea8cb005e3d7f4c9c922352a280f91a9a07c30b6aaec798aa0a5ce1e6c6a375a9e1a02736d088d70a53869295f076caaee5cb9a35718121dd7bec9ed51d58b4534609490701d3aa792f4edc34d8607bcea2f8a849f50c11a3b575907cdf4dde966d7be237a01f5e71729fbb152928112f81e23f28043fde2de0f7a91e9b6f35d04fddfd763b49167d521c22ffb61765485646636cc5aecb8451e78b13ca5deb8cb67408bed9c4b58c46321e7636364a897b9089ef1d62e1d5171baeb233009b01cbdc5df21728bd9e3b664d7554a59bfac8e1f53a6563ddb3a4e53261a8d0210b29a22fe61dbefc65e4f35cecb98dc9727e9780446a24b8b09e4244ed91fa9c177f17b9481995b37aa17afefb64e0f44e058a0db3072d118bc65669b047b63f6a12828da51a6f6add8588e1c00e2813d5fb94196704478e3ad721f5c5f245c31d9ee1934ea38d2cc9807a40eb8aa42bf31e0182ea7e1dbc554b00a53fee162480b9b55283bee1123e27d94570469357e9d46c442629906061683c580f7e7b3c0cf4f26c951b788d8a99e484fc082714bd0409629ba8352f658536758e203b66749c09d6bb7071c8549166fc469cc4f09f019e3510d61a4251f7ad61313396a820ea08ea4e38c8643bcaca7ef488603f750f8c588e944b1c182449b576a71e9a5a96d0de36c2cf04848742e753215484194b90c79c1d6c36e843241ff2967fe95f33950a455f581af5f60d03beb00b318f2782507ddaa13330c9ea16f511fa713580540795e8a3a0c59ce7563f58ef9a79538fc300a6ad69019beebaf0221d3e7ad763818c73187b10ac251b1ed7b47f7f0b855e5879d45aad00aaeaad2501e3d3be1e60c069cbb94f789ea3253808b12c43c41f004a578c1c9a09bf0c13bb3d3889fba214ae019bb3e7fbd14986482922d88e28dd173c55097737b9a155bd7a5ac64d11646f52ae5fb3626a4dee9b0a086d4552cbc782147dca21e2dc937a5b5e1ae4d5d530348cb4f0b2c28a5944c529022931ee8d17f5443374e91a63be318f520c0294d8aac96f3447496c8e0d66f1a0f93ca4e58d53556c1255b2b10de13a8e534fa060d3f97c1a619b5529e00864efbd8428a7402e3110a4bf36be4b0dfc6c847467a5973f6f96175f6b9badf53916768f6df9c65745abce49ff107afac41c8375e0bfa2134df5f8db737eec90bd1257a7ebb12cc81952f013ac1874cbff96c4ce78ed2c4efc27ffa54f8d194fe95dccd268ed7b5680a5e24eebdc7872c4aed0693a70b53411a57bcace35269138cda362a75c3c3b72d5ddc0c48e4966c8046bdccb6b4405d683b822434680b0995c49388f812ba8fa5f58a15864131cc3bebfc811add9c03b560f912970ea632fca5e0aff669095f5f149c241069651b91c6fbf4c671aa28f28b770f241787b3698b5a7abc907104ea5aad569a7f48103fa76b5ac15ade1e4bb6859f276a2ace3d8c36425bba224f02a7c93ceecd101f26dda0cbdf00c7cf8fc8f994897fec11c89c41309b3c2af64b94c8d078935078b09f5ad513cfd4ade8892226b5494934654e31f934cf58b567214eb71f2674bc4521c9c0744cc22be2756aec3b84a03f282e641a819215c18e63ef4b749ff4fd03d6561ba0b8e41f268fc22a7da77f1c65371d110e8d9b6d0005f6cedeb73a1689c4e30d6bfd84ce898f0fb98780dc8714d62c355a0c6f106816e6547452a536fb8bc09a15a3b7a2098027eda60153f6087dec013683af65b45161ca4e5ad23ed2b6d73b80002447df1c292488a30b82947444dd789bd2419c6e159c5afbcd24283a91917fd7766c3b00ff7c305b1fdee484d427d2e292bab069e45ec6dd200c6c7ae99945a485715a2ed07ec13b1fb031c9fc999d4e650af6ce5a9fd06c98d13288c59ebb37c32e4ac02b81c14f027a885459993de9053b6f1de45d37835cf2199a38480664572a6b70e6a1452fbcc3b81d744444872fd3263e78d6d0fc5477077f74ee7405990f33045a98f643e386647cdd25b8063d4ecc1b1fb3221d53b0d4ac95291b3fb27acc8dbd3ead97b30b3bf433ae20288f29ed9ab9d140c440d5f361bdbb182efc2190527bdf2619513b13b8a25f71db1bb2003e6ed5a53d3d9ee31f11830c89c4b9cd70fe451cb76e6f0918e14cff53c74195bb2862092f0f8bc952410b81b8f94a7d1e9259f4660552f8cbc399a43a571c61c52685bd72275bbae105eef57ef6581bb98c8b5d7d101cb25d2ae0025f03e485e652e0d82656b1773dceb30b476757967dcd7ea7582ff26c8d03722f3c4cad78e816c601095f4211e3af2ae40c0750f1f4ad0bb762519a7e4fdc940228b369c224bdc57e653ed39168d943450c46afac2fd2f246cd0e2d0348b0001a9f0be493fbe4c33c56bca425bf51e0f58cb415c7fe31c4fc7b41b90f1695c9f863e519ac1b44dc651253f83d05c4b7fae244719f5876e555e10368f4577c4f5d2df08a857fade07f1b16651179d4530855ea4241c258dc8d1449a2d5f0302010a7f6d4cfb43fccfc46ddf823fc165d4a841240c0a564aff2e5a62461f597ab07e0d96151637316bca9ad00deb955d94d5bec60ac99a2dc9711682fd996e23c7294d4baa98d73dad63fbbf2d39988bae02696d2f0bf1adb83d3b8eb35bc0b375eed8903c5bc0a287a648c583cfe2e8359a5a877be7864571120d843c6e61b821d86b6b7bae64373e8d77ebe1567e9223887aa1d9892937f009e1570ad8e027691ba173d6df6bfa36eef9e30b5d8d76b47ddbd46a4cf8da6024ec144f88f588fd9fac82333ac4b7958596d5b53475eac2e5f8e409a82bc8a0c11d60c15a15a093f1ac57aa0082f57e1ba680ae86935e044f63d338ed008942462a17ad1ee9f8c694594b65d51758af9d0d52e4f6b294b5fc322b3528cf2ed64bf5219fc67aa3675c9ae0fdb7a76a57433bb99861fa0afd9f40269c3cd3299300de4b0c97108c7b4591decaf0b7f4809c4a04b3efb29eec6475e922ba7c28092449ec50bc4d6880eb7783c8e192113fa936f724d76c79cf04828062268160e8e7fb77513f097c2bdb0b21a3ce4fe21c9387c9324dcd510f103eed2614761a0f0f8f4310b4047fb713c6c3ff3eb836ba5574f9cbe6c411dcdf901adbb3b6556fb9ee1facdb94b06a7848b363ecb858eaf6180e328a7ba4c8bd14bba27e0a802dba9e3ebab3fdb50c4e1b9506548483aef4af57774eef4af0585ba61aa830a7614efd77b539869408f50dad12f63a344fae106d73a23df85192d6b6cb48f2671f63b99e434e53511af34dccece976957ffb8a79f1fb11f9518ca3b4d58526fcc9677acbff0f26f0dddda7e97d961adb1b44662f62a9dd4112d9eab5fbef7e7fc6c5377764b6f1b3a96bd1c2e566b74ced7604cb2c11212210c10f838d1f2b913f9a0b7c167d521cf8dc9a97969957ec2a82b70963e79d9d52e9a216ea3dfc185333168463a071957b5d5be985fe52237d0bcebd7ca93fb3812181f5cef1eb7174f5e427558b9a39ffb470cd759b563dfcb77e71ef8ec3ca4ac5ffc49aea322a6af87a557d94439c7c3429906907b5480ea4a680943945213e87eff41f308c758c904bba305776586591cc328585a267955b3209d443b03b12e4ca77f90ad09b593bc260f5682a3a97fd1409f0900087ecb6396ed2b938163713d8577418b216569d5c4bd4079ba5ebfee44eb5587ba4186fe82851926e2b3f41b0e0d77e205d21465c144e4ca2a3d66c254f8b13482d1cd4171b6e164aa6afdb9707ebb4948d97e397a392a6b5897eaba20d3b348a82d57b54a3de11884fbc390337d46ac3ebed08cec4a1747318e3e4c86c06a1327cb59d37c974153f5df9f0477ea302275b48c6f71e79ca11bf9ef8a54ad660022b1aaaed08ffc105693e8135d2f3f6fc3e25f72fd0b1f80befa556e6a392eacc4fbdf2c2aca24be552acbb2250a4e021c5589ee7b63499b8fd34044aef32d76746ca008916a0f5685238f6aba7e63cdb1220837adfe469f31ab35a972d64b263bb91714af5eb710cf3f8acb9b787fa102d428bf4f321cf6f456453a8dfacf99b610a06f4d39ac3518cfd46a4fef6e6ffdcf316e69d62d82776204ceec3d611b36f0c32b3cfb78b44f335ac22f0987d7a6890d6725b6ac168659afda783f0614a1388225c899fa3a00716215f7793623154ea504653b30401662c642280cdef45de2f5338316d7eb686f2cd99c35c8520f941ed159b8065c9e9c9cab32de45b4e15d14c9223309bec2181ae7c326902f242c52627048651ddfd46d919cc6c4ae327c1dd0192b74e965ed8476cd0e18e031f82d477254d13e060b008a4a74ef7049ed0265c645f734d391fb5fa18e01e49db3caf28dea23b2f6807a8c321433c79d7c99ff56a6da8333edfb31e321796dcceb30cc6c78a2e0d8928213c23be3d431fd2e80b892d66f0adcc5347c70f386e27f156c0252a101bb71ec9792a84984d9537251fbbe112133a5beac4e8cea7ac0cabcf92a937e1c5dcf14ab512809805671eca444414a2d7a07872551c9ca377a1b1e46e30903b498b05fa6f14cf0e0749c4d37998e6212f41a7dd44f9ffed4c67248b68867d10228cf2171d24d6a4b23dcd590883b2cb0b78c460d29ee279e8e6f869f024cae5246bcd23bcb867f485c8bd19c905150fa199364910ed362f35d0308fa1a2062a677942a1b37371130bb9bdb99deb3a8d70d951f78648aa76524c65c845d52e7133eb32c400d179e249638629b8279fa7a56dea3c7bb6183f7a9fcff86fa6627997d895c556b11ce4e59ac075b969136f81ba444a72e103df039bbdba9f4023e56425b217427a9f767f39287a6d611a936254adc9715f665faa6d18b2040424d42cc694f218289a31623e7ef5c57e1a43d5be89aa013d0d91c548f213be651483e73bf320510115370482a7a5b709f4e1c846d2a9f965fbcfeafa60aa71db700e984f8d96a01a0bb25d5999d85a1f12c20457381508b5a2510c43133fb473441b30a5766ce3c3ff2c8d700955f28fc86aec3a8c2c9b4f1a98487019046d7d091775cefd59cadedd7c0e652468c00f20bcb15947db6410f8920d4da6d3551e5004763aa405256ba3f98b2498f7eb75711b93b49aaef66ad36c240f8aad2d3e797ca5ec460309e701fb663c7cd08b26f5f9d77020029637402003676e389b067df3d032c2e9f2c1d8077ed4c2191efeb4701f83dbac302299e852bbe850580f9c49fb6afd70ebb49be037740d0e1c72ad57130c79b32430be77ff164a45bd4fac27cdfde0c5cdc07b51b09830fe9debcc0530b48e3be86039845ff5d868cae21a1099e6104bd37dfe4864221f7f6652ee8448f33a527f6ec2b7bf08282b819201d89ff5a2ee28894da8b82b0d5883c9151cbba917cb887f6677cd3e55788683cb11f5f135fc416b5d21e20c43929c549e39581dab4152cacb2ae333f18cef3e1f4249a47164003bb4abd0daa6af5607e95c7d3a9a76a307e48be0838e881cb55a958660d856675e5e5934e22954b2434e1a16dc3557f13f1737cb96cb1e7392515c731912d476074b4bd9", &(0x7f0000000000)=""/12, 0x4}, 0x20) 19:20:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x2}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r6, 0x11, 0x1, &(0x7f0000000380)=""/230, &(0x7f0000000240)=0xe6) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x1}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_FLOW={0x6}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4044011) 19:20:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000013c0), 0x521000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001740)={'vlan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x16, 0x9, &(0x7f0000001400)=@raw=[@alu={0x7, 0x0, 0xd, 0x3, 0x2, 0xfffffffffffffff4}, @generic={0x81, 0x3, 0x0, 0x5, 0x81}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3f}, @alu={0x4, 0x0, 0x0, 0x9, 0x8, 0x100, 0xfffffffffffffff0}, @generic={0x3, 0x6, 0x1, 0x2f1a, 0x1000}, @ldst={0x2, 0x3, 0x0, 0x8, 0xb, 0x100, 0xfffffffffffffffc}], &(0x7f0000001480)='GPL\x00', 0x3, 0x48, &(0x7f00000014c0)=""/72, 0x41100, 0x14, '\x00', r2, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000001780)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000017c0)={0x2, 0xd, 0x3, 0x9}, 0x10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)='\x00'/14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001380)={r3, &(0x7f0000001280)="756eb6f30d6be0cb5c2d9ed173cf4c6240fc71f4feea6002c1f5e7fe4557db5630adf1d28f16d64d450a39696c46675ade5524b0b182e7a2b3686b56974746fb351cab80c6af46dfa5698a60c94746668c0ba77865ddc693a7c895fe77e2d8afa38bd4d9f8a7de3a7147cabc507851e2dab7d73ef88811394ab121eb973b84a840f443061a7c84f7d214cb18ac0eae586e2ee21a", &(0x7f0000001340)=""/63, 0x2ee34104305ec5cf}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000001200)=ANY=[@ANYBLOB="1838000001000000000000000000000095000000000000004470e0fffcffffffd97950000800000018180000", @ANYRES32=r3, @ANYBLOB="000000000004000000000000009aba9f7659c5630ae3000300000000ebff00000000000c680900faffffff"], &(0x7f0000000140)='syzkaller\x00', 0x400, 0xb2, &(0x7f0000000300)=""/178, 0x100, 0x8, '\x00', 0x0, 0x10, r3, 0x8, &(0x7f00000003c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x7, 0x3f, 0x1}, 0x10, 0x0, r4}, 0x78) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r5, &(0x7f0000000040)="c3ddc80e27deb4f80b14e7da2c2adf2bf6de74045f8fe03980a3f94d01c4520b7889e96a80300ed40db7407c3ee326b6acc325504051a8b5030c49020ec555c7c6828dc008cd8c0ee79200c37347beb35222510f4b29cb056e332fe4ffe929c2a6866c3f6e1d", &(0x7f00000001c0)=@buf="0cece1862022ff870e084c4f5adb652624afcf6259f4a0fb966e58f5e1c17545dfb7870101fed1e88919b6e5da301f5126750442d27916abc8d9f946a49e58ff58d81d75452f33deefafca6fbb3e65279c828258f0eaa63c6783fea5a46b05b0c9e008681286efb158ed9a07cc62a4cc833ac8ad506fbbc1af90bfd6f5cdfe990811454884eacce32da28e4511831f1221147cae2a6f9a"}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:45 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x3, 0x40002, 0x3, 0x0, r0, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x84fa2000) 19:20:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x4}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x15, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_pressure\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@mpls_newroute={0xa8, 0x18, 0x400, 0x70bd2a, 0x25dfdbfb, {0x1c, 0x0, 0x80, 0x3, 0xfe, 0x4, 0xfd, 0x0, 0x500}, [@RTA_NEWDST={0x84, 0x13, [{0x9c}, {0x200}, {0x52f0}, {0x1, 0x0, 0x1}, {0xf2d6}, {0x1}, {0xc8, 0x0, 0x1}, {0xc74b}, {0x32}, {0xffd98, 0x0, 0x1}, {0x6}, {0xffff}, {0x8000, 0x0, 0x1}, {0x8}, {0xa12, 0x0, 0x1}, {0x1ff, 0x0, 0x1}, {0x60}, {}, {0x8000, 0x0, 0x1}, {0x5, 0x0, 0x1}, {}, {0x3}, {0x8, 0x0, 0x1}, {0x400}, {0xfff}, {0xff}, {0x4}, {0x5}, {0x4}, {0x4}, {0xd5e3}, {0x12c50}]}, @RTA_DST={0x8, 0x1, {0x8001}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4040000}, 0x2004c884) 19:20:46 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOCTL_GET_NUM_DEVICES(r0, 0x40046104, &(0x7f0000000000)) 19:20:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000011c0)="e480f81e01c1ba0b892389884989c1bdb0ee80905b29a33436e896d7c85ead766f2e6988c1732f4f9297c25638efb10196ef610fa24791441c62e40e8c0b4cf2bfe566c9b1a82ac821b6017b2195f43cf495a989d5daffa28faf57947f96ae0760e32ecb97ffaf5d339b815b80bf3200fddf8458ca902ee8bee08d6317fe376f5388dd64b224f95dda9133a9922ac7f6ef1339eafe9bc7f50f6d2de65473ca916d6ada6885796c034cd6281620a970685fee008e422ce791d3a5864b752ab9e52153b07576085251e213608c507df35e0982696751f4febc531d2ce98d83d8f6c0e445ba6b83b49f850798f528e21210db5c0aa2320c352a0e06c97a456fa57b59d1ac9c883b113bf397d49755e00010a5c273c5ec49ed27b0ba8e38f1f0bbf897db23392681b1957db8394e1bf32a7c692fa16b0ceb0458ddc6958a94164ce00e249abeb7b19359d80bbda2ed7fa9822b06703580de8715910d22f3a973a91c7f953a4391e2e4415307695614d62c605580ca655bbf77a9b2dfa8ed03444f3cbf199474d11ae9b453a0ed61b6ebc1f0aa95a9be7a79adfb65aa5dca0aae08747e808d6f1ac8174b57cdfa5d1703d9c9f64a9909a182ed62eca34463fc7a88de3650ceb2e4a7276228cfcbc15d84e020efb1bd4b5b4be2fa185194eb7ec5922d4fba399a1bd928bf421cd1ae99ebe63da5a4f46cd8ae0581c4a1495a468bc4184c15bcfe0b6c9e376c8a4e754a02569641da31e5e99057be500afb31c4165d2f04f9fdcbf6593edc662184ca440f0129d4e4378179984f7935435d776bde5a62be41823650c1c1a23913c8dabfdf5eb9796d689200433754bfde58b6cbb9248e03242571f73ae910391a956c7d6a30590bff26966c34171a2ae9df32b4c24c9b8fbf088bd98b0e09417536e1ddb446e62b212836bb625f061638af7a6c02dd80d6115f5a67a441ceb167257e5ffeebfc09270a634a1a6ba7fbaf627af3c50a3aac2516300950df20fe6effc4222f7a85bdbaa999421390e642b533e3bf95f334a8cc156f6f54a8bd8c4bfb271545bc824188a43835e3cf372d6f032622647c53a77f0c79e544b15258ecb76a03b7f423064ca4ff2bf2fd72dcf2d5c49f04e777eaf24fa8ee3be139d2b0964bafb87466b16e604ec0f41592f9930a114e1d05c20e1a9ea3052e37d580cd3986597dee35bfc9e3b44386eccfa9038e0e4a655bb78b250af1ce127e2beb9375ae97cbcaca5177e911bbe56299cbc852875c3863c7352e384c181ec994d36338fa26df3eb5ca312b1576dee3ecd0d6ffcaf72a95550ac5dfdfe84ebb3812d3db9cfa168508874647df38efbad2dcd45bcef1091b6a92436b9b452e5bbeaf650577501f2660bb778b71ef80fa9200a75b0209716b3a9e522e7ab42cc7e4863016e9ce80859ec9518b90e91d500e67e91505d51db93a03cef8bf004d2e260527cd1b29fc2e729e4089aefbd3a79df69c50b4e48c952a74d5ff89a653542542a7b433488025d729a83eabf3d036f98b669b151142e5c320eb087c28e9b457afcb42a4fd345aab67028677510aaffb76ca287f121e963a4b7bc8ef20e2bd585af878d810a0fc9c91bd0af38125d0ce35e7c539c5f4fbcfc34e42e06af9c1c8bb4f9297965e6238ab6db0b2e46797fed830daa3d88041fcf74d677cd637801dff98b0bfa955e40fc27358e02220a37a166b8aa6561ea4882dacb73f1a21fff3ed7140d83922632769b8d9d7d05d4985a78e97ba399dbbb620c40264fcfe8a3b07368839b75057975bc689eadd1333de1c36aa82ebab015baf29acf3342bec01768d687504c01ac3620e3242d96bf42ad568a2c1e03436da98b47192fedbf3a50bf56172e45f1153e51e6e429d373997da758a73c83cb4cda43f17aeff9c8dc245868db05acdc4264cc5233d5ff720e2c7b3f164087a88022a747c6cbc025d08e82e342b3606429d87f07af3e11d54994b2fbc18ddf818e68fe065f82f625ea37ecc3274f2395bad3d249c03d57f8cbb5bc660e1b49c2070524a10b5e01c3d17cc11b73421c7b601c6db01ab02c2072a208da6fb24040c6f34cd6426f3a14b8f0e8c19217221e8f6ff16bd73247cbbcabb3ff89d109de99856a205f1f699f11ce9e089bd99785386e74bd97942e0ea5b1207007f634da5625d3ba67139994b46b1f7d2a49871b488a1f709e4e2eefec8d6d15b5a7f202aad06ceaa78713529a48fdbdff2e10694f15123256113f96ef44c67f86be44f99b0a61499236f641bc0c7f05f59f44ddb7e1f30cf01cb50aaf5ac5b8c63ce1408c8f54484248a8e1e260a94ce1b6136ed2642b422773f639f53a438e319b7cc31b6728679214636439641ff62059802d0428ecd8b58c9655cea0919e143b6d7fd7c9846a0c5ec89d73c869d6a5e160f478873d9c261c09018b4e2f491c952b701027c8eca218dbf1b62229966b79c20a19e2c3fc1e54bc46f8176d3c6de166df0ab4442f6286de64577194ed78ffb73d695060654ea598d98ca4dc383613edb754ad34fc7b0b1c3fdeaf3c3c6aad5475c68d5b51bc991dd1462b13c9d29c33df9e13559362406e2e2eb3a17aa957ce2479466e0a57ad5babad132269618909cbdb5b55487225f9e35752ad5a1afbb3ce7f5772fff7636a24337f672734b05f5a98ba7cb24032cb852218215d19023e9d76bd627875e8f7fb8f48eac56af4f981185dbb44621533309ab4906abc778c92016d5e1c9165880cd1d0bcc722a424dd07581a67b8bf45728a27097ca3c117bfe4a41bc8300bc0d6c9fef780273d89f1172fcef457e641e9800e31620c8d0945489f2f781ab3fe1596691dfb144b0b407317f9138f048aa67ed4da948b818711b2ed0e146cca8f9a1a03d7a308c2b1ce329e017bc340797a464db04f8a428f5dd3b25d4fac973b9ed1d789abeebafe2b791353adb0e6add6d22eeca5d0f4aab33f9f8f3cc5aa1c1ad9d2b33b4ba32667b9d366cd29c13c7d7a3b1bce43091e323a4008fceca034af9477c2a5505fd609e45301ea1381082e8f42fc9160cbcb97e4b82b1af07f12b8028f2de6f50b14e97de39809ff993b92347d06e9e37b6e48a63a801155a1ac127561341718f171179c72a6e04387b7340950e6a2567781dcbefa650a747db9f4dd5fdfdfa99501943f38fc6e00e8edb347634bd9363a9c5c654261e6785e103723c38c62fd894014bc7106b19c8e183779b65f3e44a4780f796ff0aea0256a59470072eedfe8f16edb47470a632568035273ea7d9469b73a45602a2797cc41f4c87596cce4b5c2af75ac9eff688898e1b0fb7de525a0b5080e4d0f61f27d2da5ee3f6b4a9747d3b57783cef1b3940e638c7ec02c2b02d09fb81a48b562c29ab912467341d220c062df6f3c83f7f8d0034ed0b43d52a4d59c874fa4ce7331624e49a31cdf2da4ab69bb3a5b8d5b5ead416bb3f9c73eb32f8e3fdbfdffa75b44d8a566e66862fd473993fb82f2375f85037512bb5f12cccff06f1f629e43bdabeab370782b62b5d22a973baca54d4ff2ec0cfeace8d1e822885191b1624708e46cfc2228a6de2fbbb4aa1086c3fbab8eaafbb43e38ea8a1b51720a9d9827148afa18367d81e269717f5783d7a96de597e470508d16aff7a8e602f70f870633fc21f24a0401ab1e6ade5a0464820dd9a5d1f2f9d7a349ee0b1b3e9514b9b3669e3f4acee6823020f1382ff7609e768d139c8ab8d3e6cc2e59969275a82bbc433e28676421c8feecc1132dc9960c05dc3ce106c295fd94617e94153cbee92b3387b1ead88c92e840c04eafeaed65a52108347d2648fdc3d857daf94a672137677977141eef357a651ad961a69917b0d3c8bf13b1252971812f7179acf86f926bff297b47c80baee8d6b44370f9862f5bdc3b3da001e8e72e5db6d2b256ad246ff8056b3ae5a1e3e6c1a07be99ba10b829b28ea030c1c123c6851ff3a21ec75a7ce040c3fcb473a6ba1b7c428fae11fde58945b0ee8d40974463069bc8e5c2727da6534402026bbb19bd81eff65106ff3e733853e233a3c477ac020cbeadcd02e10d9a57f6cd52c99f2b78c4556a137db9e17e5aa0d3b26a8206aa810a600b3d0e66aacfda7b3dfcd8d34ddd9800b41144690ac41d1b632a627068347f12dd847c10556ad9f7ab35700f430b42c1761b41548bd58bda243ad58de8bbf5cefe2d2d6e673e870e035a78ddf6eb84c2ac545cb05e5e44b1a385b04d2f3ba5c0bda4b9cdb059703075a31e40ed0b620f058727f4e0a2f751ab074755df3f83f7cb7819a25de4a7f3f8d828808f13e4fa20bc1a163b9550214651375017c69d9430c406b309fc07b7f0959660c5d722c693c0aab4316b78eee03fa5c00c736b74e9ecbc90c04c32a4b89db9edd6c1661cb9c2a03e763e139020ede49ed79c061bc195450e365ade4f169f80c24d0b79fe6885ec91c8dd3a8576f37fb74c229dd8dc5c2c5b65e533bffa4a81787fe7fca13e65bc556cb3a1447ab88a3902bed50963f4d4648daa0538cd49d84711ae7c9fef78e19c3ff3e40d968be624f89456def8e0fe3600793dafdd344e578d5fc5dc37d067f51af47df3d0e8f4e105506e3f86df36e327a07bd3a07097e22ac89c651e8172ca39d9b94a768d8c6094b8f9f4c23e0245a1696c26d5b80b32548e15de4adbfc6175c27484307e56d7153685f77198538b572a89a8c898ffce6a815818a26c4ff7ef1b4f9ed0028cadfa945d1ced53b24168adec33dc6daaeaf81b0bcd69a7b0706bc06bc1179d792719fc2b3863b842f6f1249832cf8d07ec5c705716d3ea47d4ae671ca073dc259fb5f0294058e5652d54c591ad2b300ffbf9dbd0afd5c1e5710b547373563fad881448ccbe13bc0c109a6fb50c0093750c29f90fdc08a2680cb770dda9fd45f6da54d05c4aa2d0857bf336c036d735b75fe94eff6a5bb2c17c90a14df019603af8d898bfd11a453612c4f46fbbf0a9bc41bf9e502251cb4840a844bcdefe02e1ff17a9da79ea9b91c73413d1647fe79ccf6cd67a701003928d1b2d449160aa45f4ee495d130b774a639ffcd177dfa95c4dc399f8314cce48b2ea9cdb2d2e78e52e0a104216bd5b39ff51604cc441ee437ab95ca463a4144893e460ff973a24c38a297b13d74683490d5413b463993f1e093afdf64bf47dcf7e8c4246de8307dd1fb2fa0487dad99e50d0b51f0c36093dea76d8b6bd0002999799cdb372edd1f01b6f644fb99b9252a6be3df92c11102c844a7a648680b4fb834faeffd6fae4314ca93014d0714eb09e6796c0f3487d0743e5cdcec4d08f614d592ebb362a56ec03818626dbc6880d2762c360483b9bd8bae0d439fe37d79ba3c56639e9737ae3be0095a7b417252fd6ebad7d8928d74af2ae9449caf1cc37d1ba192067ef660c9564c2b472500e39930759dc21c5ae01d353b42694e3736c65581cefa160d38b619d31d97f1182b26f53656f7b9ec55b0ff7a67561982f2673d90aaac352ce4fd732b35166a1a75aeafc5186d44f465717183f595db342e4bfd0c998e4e2f017343fbff568e3480926a816ea0f7683d647a10b13a7f42ad18e6c2054ef0fc2b7377fd4f5a310b2440245850090e097bce8377b32b9614b02bd6729fe10ca8a37468075b2c83fc3abeda8e7e0cf6301d08dbd0046e7bbb8225f06833633d06d1dbd340f0d27aa35bcb613eadce7663952e5df5235fc9dacf9187bd637b787e924ec02ac934dbb43e736127a72397ce8870cb70f71b0567f32e747c8567bce1eb19ec20adeeb9b76482b077b4ff89da6c6f5e464", &(0x7f0000000000)=""/37}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:46 executing program 5: syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000240)="cb7abcbdbf49aaeee03f025c110d6655c0955eb06bf9e8e5000f0d90f4bae5e7a58d0da9d0a4da8747e83dd62b10f856e9a7e15d4e5ef5ed7a70bc8b21dda4a4b201000000449336b8f54bdcf5f2af106e4cad8070cb40e151b7eea1e0aee8eab807c1a06807b54cedea99d48ee33ec3a50ce85bcd67dc0bf848ba3d7fe71396a961a52ed8ef402ad74986b30cddcf7129aea36e62f75081908a49442800a81b381fd95a6c16e830ef8f080f053a99ef73a2", 0xb2, 0x3}, {&(0x7f00000001c0)="1476969536d5eb9221932b5b788c4d3d401a403599238544169187b2cc63b2339ce36ddeeb57fffdd6b4f0f66524e74024963b2781cb1e3798a5692b6bb883c285e74f4b9cb354a18b8cb433c88323b8a49aa8ca014544a1c10b784642e3101eb14611dbf22e902fcb355f0a", 0x6c, 0x100}], 0x400, &(0x7f0000000080)=ANY=[@ANYBLOB="002c002c3a5d282d2c020061756469742c636d61636b66736a58823b0498e07f726f6f743d3a2a40f096366c32cfee0a736e616d653d002c00"]) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f00000031c0)=""/102400}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) getsockname$packet(r1, 0x0, 0x0) 19:20:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x6}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x108, 0x0, 0x108, 0x0, 0x0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, '\x00', 'veth0\x00', {}, {}, 0x32}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@esp={{0x30}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001340)={r0, &(0x7f0000001200)="e7bc0c75d659ac9e2e793771f88d6f9c3dc33b10cd186ffd30e3311a922a42200cd447a7507850a13a2c422f24bbe89459ee390f4f14bedbc684b0a8f163497eabf977d3b3c8d08f67cba4734aadd3da16b6a1e065abb51eb254976a7523f6f778a6c7cd67b3b8e38694e29b75519c66cf16b509dbad831564ed96b792b49129388c42f23fb7d16326321ed5fefa05a5ae925db3fbcfed220c06f654cdd73c0b5229c9c5e8b77384fc04cdf9e0c35def28be5f2009d1cfba9138b9a9e500294cd4e1a3bfc8112535cfae7d9b40", &(0x7f0000001300)=""/16, 0x4}, 0x20) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x4, 0x1f, 0xff, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x8, 0x0}}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x32}}, 0x20, 0x7, 0x2453, 0x5}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001540)={r0, &(0x7f0000001380)="82c8ec0b440647735b5945e916f0e52b43a4fe1eb593c0b299e74248558f6e8121b09d794ef0da37fd0938fdf68d5c191f93f4a42eea7314ff2b97c9a2e6819cfcf7a1892ee1640b9f6a20727d496611c79c44e53c24804bd5861a187ed3e1b12190335dc081349cb26304cfcc9fc1d4126cfa066432e7398c458d7606d117a4780e6a473e821aef16771bef472d2c6aaf5f9acf03f9aea082b9aceb8b9215964122fd9b94256f21c7e753107f1c0bccbf4fe5eee1d801402bd59cb0769299f2c35c1a5af46626bb8e7bd773fabad6da49f478f0a9de325e36cf5570c5b089944e635c6d159462a3ab36ca429f4e5a9e3e", &(0x7f0000001480)=""/146}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x4, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x1, 0x1, 0x9, 0x4, 0x6, 0x8}, @ldst={0x1, 0x2, 0x2, 0x6, 0xb, 0x7fffffffffffff9c, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x2, 0x5, 0x6, 0x10, 0x10}, @jmp={0x5, 0x0, 0x2, 0x3, 0x8, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000040)='GPL\x00', 0xfffffffc, 0x65, &(0x7f0000000080)=""/101, 0x41100, 0x29, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x3, 0x51, 0x5}, 0x10, 0x2fd68, r3}, 0x78) 19:20:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000012c0)={r3, &(0x7f0000000000)="2ed3f13c7d30a16b9a84a12e4801b7978d25277c", &(0x7f0000001280)=@udp6=r1, 0x4}, 0x20) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) pipe2(&(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x184800) r6 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r7, @ANYRES32=r7, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x1e, 0x2, &(0x7f0000001300)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}], &(0x7f0000001340)='syzkaller\x00', 0x8, 0xf0, &(0x7f0000001380)=""/240, 0x40f00, 0x2, '\x00', r7, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000014c0)={0x5, 0x2, 0x2, 0x8}, 0x10, 0xffffffffffffffff, r5}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xc, &(0x7f0000001200)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x40, 0xd, 0x2, 0xffff, 0x1ff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @exit, @ldst={0x2, 0x3, 0x1, 0x2, 0x1, 0x8, 0x1}, @call={0x85, 0x0, 0x0, 0x7}, @btf_id={0x18, 0xe3d98c88658af435, 0x3, 0x0, 0x3}, @alu={0x4, 0x1, 0xd, 0x9, 0x3, 0xfffffffffffffff8, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x8, 0xe8, &(0x7f00000001c0)=""/232, 0x41000, 0x1, '\x00', 0x0, 0x6, r1, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xa}, 0x10, 0x1feae, r2}, 0x78) [ 500.014711][T25135] loop5: detected capacity change from 0 to 1 [ 500.047961][T25135] attempt to access beyond end of device [ 500.047961][T25135] loop5: rw=2048, want=8, limit=1 [ 500.088047][T25135] SQUASHFS error: Failed to read block 0x0: -5 [ 500.109409][T25135] unable to read squashfs_super_block 19:20:46 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x7}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 500.168143][T25135] loop5: detected capacity change from 0 to 1 19:20:46 executing program 3: fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x3, 0x1, 0x11, 0x7, 0x28, "7f9ca4dfc7fce2cb3942e2e4bce80c9b2b709dac1a599727c38ed47de2ff01d5fb4629d35b6a4e06"}, 0x31, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@broadcast, @empty, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'sit0\x00', r1, 0x2f, 0x9, 0x9, 0x5, 0x21, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x7800, 0x20, 0x1000}}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 500.236770][T25135] attempt to access beyond end of device [ 500.236770][T25135] loop5: rw=2048, want=8, limit=1 [ 500.242679][T25145] xt_CT: No such helper "pptp" [ 500.290536][T25135] SQUASHFS error: Failed to read block 0x0: -5 [ 500.315179][T25135] unable to read squashfs_super_block 19:20:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xc}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:47 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r1, &(0x7f0000000440)={&(0x7f00000006c0)=@tipc=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x5}, {&(0x7f0000000840)="ff", 0x1013}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:47 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)) 19:20:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x210102, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000880)={'syztnl2\x00', &(0x7f0000000800)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x0, 0x4, 0x20, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x80, 0x80, 0x3, 0x1ff}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r5, 0xf, r6, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r7, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x4, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000009f00000081b70900f19c000018140000", @ANYRES32=r1, @ANYBLOB="000000000000000003307f0081a951db84d973b5981fb337cef30100003f6a905a83399491994e7cc2185904de865168ee2db25af5ca8fd4c9379ae965c52cc729a7cabda962e7a43816e736b69c886b7790a2c4f19b75d5d61cf5231754a2c7a2690fc7dd97fdc082f86499c62adc25dd124f3e9b9500db8e1d97015d785fba289d9719000000000000000000002e21e9de"], &(0x7f0000000080)='GPL\x00', 0x1, 0x1000, &(0x7f00000011c0)=""/4096, 0x41000, 0x13, '\x00', r2, 0x1, r3, 0x8, &(0x7f00000008c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x1, 0xd, 0x558e27b5, 0x8000000}, 0x10, r7}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x40000, 0x40002, 0x22, 0x11a, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x12}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x408000, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={0x1, 0x0, &(0x7f00000021c0)=""/4085}, 0x20) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000040)={r0, 0x0, &(0x7f000001c1c0)=""/102400}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/111, 0x6f}, {&(0x7f0000000240)=""/175, 0xaf}, {&(0x7f00000000c0)=""/41, 0x29}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000380)=""/211, 0xd3}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/252, 0xfc}, {&(0x7f00000031c0)=""/4096, 0x1000}], 0x9}, 0x40) [ 500.681117][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.687562][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 19:20:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f00000031c0)=""/102400}, 0x20) 19:20:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfc}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 500.787624][T25188] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 19:20:47 executing program 0: bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={0xffffffffffffffff, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000011c0)=""/4086, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff33a70e4dc4193cac18e78551e6ae5dc926959b167fc09e23ec3679d818a05d29fe4df3f31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb58b070440dcff74c4c00b0e13212a55db69f2a6bdc6f9baf4ca444f46ac0af3f519cb8ce0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b2a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1dee58e7ef72e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a0142d3a0cfbef22b1a264c62328e5f93aa752b9780f51b079312eec1c06917a4b9aba"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) getsockname$packet(r2, 0x0, 0x0) 19:20:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:47 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000500), 0x1) 19:20:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x600}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) dup3(r0, r2, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r5, @ANYRES32=r5, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001740)={0x71c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0xcc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x67}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x18}}, {0x8}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd012}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6508}}, {0x8}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffc1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x4}}]}, 0x71c}, 0x1, 0x0, 0x0, 0x4000}, 0x20008010) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000)="539cec97854f74d42aca3815325f391eb32d1bca538da2d474de6205ab88b88dd68320fb5269f3ded0a2eaf2caef49874d91cf03d62d46064ec52996105e1709cca15722bd88cb25fa58828f6dede979641e0b7b60d2830dc43c93c236045d09771c22138daf4187855081b70071312c87f74759f4bd89671ca509534f10a11f3b8f4c1e43f0330a3d2d7190b447b4a3976e82112fb4b28b1c64f3e13414a8972586400e1f9f70f12bddb809c3198dfd800043688e87d881abe716efa6a932838a9fec7656fe06241394200184ae65d4932c7fc2d8947291d64e", &(0x7f00000001c0)=""/145}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'ip6tnl0\x00', 0x0, 0x4, 0x3f, 0x7, 0x20, 0xb, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x10, 0x80000001, 0xbce5}}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x1e1200, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r5, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r4, 0xf, r5, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r6, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, [@exit]}, &(0x7f0000000040)='syzkaller\x00', 0x81, 0xc5, &(0x7f00000001c0)=""/197, 0x41100, 0x3, '\x00', r1, 0xc4f298fddc5f4a19, r2, 0x8, &(0x7f00000003c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x3, 0x101, 0x5}, 0x10, r6}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:47 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:47 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x700}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000011c0)=""/4089, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000)="4ce7f79ce097d88ff98ca159e5ef1488c94c79f685af66bd73669a94f4a3f737c5267c04643c3356598de0fc25e0b968934bde33e9a2706a597611507ec160d64adf0444faeb79c621728ffa0f15b2706a4c99cb0d5c29a5c4e180b6eeea4b7b843c3db65846fedf6e39c17c2f2c8a742e56534b306fd3ac83d8ba02f94eae6e2fe3b2fac7ecc512d53d506c2004ba7cda062cd9bc0d9b6403db15fe20c04a361d721816e48b4844364c36cdf5f8098ded9b3fcf6b06a0302d94c3a60658e3737cd8c02558c0ebb05d1b7cbc4f0a758cc64d57e16f1153dfbf7ec10eee6ded0135bd7a7116c316cb8c70d37571f53612654019e8", &(0x7f00000001c0)=""/172, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="b8a892c48de3001000000200b4b4c0f7e81c0daf6dee158bc74d38cb000000000000078bffaec9531e5c"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) recvmmsg$unix(r1, &(0x7f0000006380)=[{{&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f0000000740)=""/149, 0x95}, {&(0x7f0000000800)=""/54, 0x36}], 0x3, &(0x7f0000000880)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000bc0)=[{&(0x7f00000009c0)=""/201, 0xc9}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/249, 0xf9}], 0x3, &(0x7f0000000c00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000c80)=""/210, 0xd2}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/4096, 0x1000}], 0x3, &(0x7f0000000dc0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000000e40), 0x6e, &(0x7f0000006300)=[{&(0x7f0000000ec0)=""/12, 0xc}, {&(0x7f0000000f00)=""/244, 0xf4}, {&(0x7f00000051c0)=""/4096, 0x1000}, {&(0x7f0000001000)=""/232, 0xe8}, {&(0x7f0000001100)}, {&(0x7f00000061c0)=""/66, 0x42}, {&(0x7f0000006240)=""/146, 0x92}], 0x7}}], 0x4, 0x20, &(0x7f0000001140)={0x0, 0x3938700}) r7 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000064c0)={0x0}, &(0x7f0000006500)=0xc) sendmsg$nl_route(r4, &(0x7f00000065c0)={&(0x7f0000006480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000006580)={&(0x7f0000006540)=@RTM_NEWNSID={0x34, 0x58, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_FD={0x8, 0x3, r7}, @NETNSA_PID={0x8, 0x2, r8}, @NETNSA_NSID={0x8, 0x1, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0xc841}, 0x8010) accept4(r5, &(0x7f0000006600)=@pptp, &(0x7f0000001100)=0x80, 0x80800) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind(r6, &(0x7f0000000340)=@phonet={0x23, 0x0, 0x5, 0x18}, 0x80) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000067c0)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00138009000100766c616e000000001c000280060001000003df0100feffffff0100000008000500000000000000007be3581375bd3698868d9a302760298cb97d594743e2db491f672f55c5cd95e0a884bbc499e1577bbbca6258131a1a99e61a2c525763b07f33df9621cd8151b754c664e7c689cf1887ca3dc1b65560278034fd4ec43fb328da39", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r10, @ANYBLOB], 0x5c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x6, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x1, 0x7, 0x0, 0x1, 0xfffffffffffffff0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x71, &(0x7f0000000080)=""/113, 0x41100, 0x8, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xb, 0xe68, 0x9}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0xc, &(0x7f0000006680)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)='GPL\x00', 0x4, 0x24, &(0x7f00000004c0)=""/36, 0x41000, 0x0, '\x00', r2, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x8, 0x9, 0x8c13}, 0x10}, 0x78) 19:20:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1b, 0x10001, 0x7fffffff, 0x2, 0x60, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0xfffffffd}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000)="c7c9e1425b1a8b179865cea1a165c91bc7d4b67a16c18a01c2b2176e592923d3b9", &(0x7f00000001c0)=@buf="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", 0x2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001200)={r1, &(0x7f0000001300)="fe34b705e4843d926744a07708fef3fc6d7ade08b8a7493e9ba2d52b840db16da2160dac684c37926d6c96e96039cdaa7d9621eedbc53fa2d34e620cd4af66eeee4bf0323800293afb0e08d930674e682d3aa0131601fe121a492755d46760c5a38d8d42100222f0161c3e08109861ae07d6bdd648262dd5536f511597e6762002b803352283990de00d3419a698f117de64a8131f8923062686b36e9a9fe01560ac377275958561713bffca10785d3d61b0ceff2b3d8174fbd519962ea5d425abbb5b0a4081bf8ec2d2b1d0b60cd76308ad3d3a12f021cabe6fc36d9bbd1c0482943c44cee53bf649dcd3264b197b74ddbffe", &(0x7f0000001400)=""/199, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0xfffffffc, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r2, r1}, 0xc) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000001280), 0x20200, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f00000012c0)=0x3, 0x4) 19:20:48 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) [ 501.646365][T25249] netlink: 'syz-executor.0': attribute type 19 has an invalid length. [ 501.681653][T25249] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:20:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x48}}, 0x0) 19:20:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xc00}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x800}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x16, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x7, 0x9, 0x0, 0x20, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x3f, 0x2, &(0x7f0000000080)=""/2, 0x41000, 0x4, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x6, 0x89e1}, 0x10, 0xffffffffffffffff}, 0x78) 19:20:48 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x1200}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:48 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x2, 0x0) mmap$snddsp_control(&(0x7f0000ffa000/0x4000)=nil, 0x1000, 0x3, 0x30, r1, 0x83000000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000040)="11625a7dfa7836bd83be8c112ab243d27c6dffe5253f3d3ec801b8c2496c4912e7ed4bb91b1a67a5ec14f864c5f18fa360c1a8783174ef48480167c8e184b97f47aefe2fb5fb9c74441af138dbbae8c000efbf087e470ab331c9eb8b4dcba7b3", &(0x7f00000001c0)=""/168, 0x4}, 0x20) 19:20:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x40000) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept4$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x800) sendmsg$nl_route(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@mpls_getnetconf={0x3c, 0x52, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @NETCONFA_IFINDEX={0x8, 0x1, r7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40800}, 0x20008810) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000007c0)=@can_delroute={0x1b, 0x19, 0x1, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x4}, [@CGW_DST_IF={0x8}, @CGW_MOD_XOR={0x15, 0x3, {{{0x2, 0x0, 0x1, 0x1}, 0x6, 0x3aee9a2d850e33dc, 0x0, 0x0, "fcc6db29b08a2e25"}, 0x6}}, @CGW_DST_IF={0x8, 0xa, r6}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffc, 0x1, 0x2, 0x7}}, @CGW_FILTER={0xc, 0xb, {{0x2, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x0, 0x1}}}, @CGW_MOD_AND={0x15, 0x1, {{{0x2, 0x0, 0x0, 0x1}, 0x8, 0x1, 0x0, 0x0, "eacc7c5cb4865d78"}, 0x1}}, @CGW_MOD_AND={0x15, 0x1, {{{0x1, 0x1, 0x1, 0x1}, 0x2, 0x2, 0x0, 0x0, "e3188a3fb83d4f59"}}}]}, 0x80}, 0x1, 0x0, 0x0, 0x5}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000300), 0x2a000, &(0x7f0000000600)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}], [{@smackfsdef}, {@obj_user={'obj_user', 0x3d, '(,'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@uid_gt}, {@uid_eq={'uid', 0x3d, r9}}]}}) fchown(0xffffffffffffffff, 0x0, r8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x65}, @alu={0x0, 0x0, 0x5, 0x9, 0x2, 0x1, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7}, @alu={0x4, 0x0, 0xb, 0xb, 0x5, 0xfffffffffffffff0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x79}], &(0x7f0000000080)='GPL\x00', 0x6, 0xeb, &(0x7f00000001c0)=""/235, 0x41100, 0xb, '\x00', r6, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x101, 0x788a}, 0x10, 0xffffffffffffffff}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 502.115022][T25273] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 502.213114][T25277] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 502.388560][T25283] netlink: 'syz-executor.0': attribute type 19 has an invalid length. [ 502.397608][T25283] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:20:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pwritev(r1, &(0x7f0000000940)=[{&(0x7f00000006c0)="fa308b13a8e3e53cf9fc9ff709706a095c8c2a9beaeee24f61f2f718f8a653e1e9ecd595343537bcaafedc2d4af6", 0x2e}, {&(0x7f0000000740)="70daee7768015fc4c600fb72377bb6e18dc48a9b7cb46eb6d909432368b46fca9aeea6c5370fc1475cee1b4f5142161472641f9a8627b868beeb4c960eae89d78b2d3425adeab6452909c8679c75bd88e4b113b5015bf9d0a9d3c88aa57c3a24e5159e0d30f146771f492dc872c685c76cff9d1c00c110d5c5587f1cd096f5e91fd4520c4f485401f29d278204a5ca4de804d3e0391e32ecc919e25f2ad0ad389da3d3ce61db4b8dd65c11682f0d206f896717994363fa473a7e65de90596380b6abdf26350a9e002284", 0xca}, {&(0x7f0000000840)="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", 0xff}], 0x3, 0x9, 0x9) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x110, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x3801, 0x2, 0x7, 0x0, {0x4, 0x1a06, 0x0, 0xd1, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x6, 0xb4f, 0x2a}}, @NL80211_ATTR_MAC={0xa, 0x6, @random="f2e4f9d59aeb"}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa1f5}, @NL80211_ATTR_HIDDEN_SSID={0xa, 0x7e, @default_ap_ssid}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}], @NL80211_ATTR_KEYS={0x90, 0x51, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP40={0x9, 0x1, "d39b98e156"}, @NL80211_KEY_SEQ={0x10, 0x4, "73c1c5a0a80df9a0769c72fb"}, @NL80211_KEY_MODE={0x5, 0x9, 0x1}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x2}, @NL80211_KEY_SEQ={0xa, 0x4, "68a41eae277f"}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "f3748397e853ec402063cdc24e"}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_TYPE={0x8, 0x7, 0x1}]}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x80}, 0x20004001) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050000000000170000000600000008000300", @ANYRES32=r6, @ANYBLOB="0800050003"], 0x24}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r3) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000f7ffffff010000140400000095000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0xcd4e, 0x1000, &(0x7f00000011c0)=""/4096, 0x40f00, 0x13, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x8, 0x7fffffff, 0x20}, 0x10}, 0x78) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000e90600000000000003000000051700008000000018110000", @ANYRES32=r7, @ANYBLOB="000000000000000018000000ffff00000000001081b80000ca52800010000000ac938000ffffffff31490000080000001833000001000000000000000000000085000000000000000700000000000000c28dc68eb3496631503ea08d0e67bf6572a6eebae2dd87e9af312e8964a2011c6184b53b86b6506050a2b1daa9ff02888b47724c9d9c5c350c621b34133932da9d4e88c7880e429f63d66a5ad89cea8a593f446184d02cf3f0534e7b3b5879529dac1261a6e78f25e7416785f46b829fbb67f717a4be4b75c154d0f517e7"], &(0x7f0000000080)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x60880, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x8, 0xdad6, 0x10000}, 0x10}, 0x78) 19:20:49 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x3f00}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000340)={[{@subvol={'subvol', 0x3d, 'euid<'}}]}) 19:20:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:49 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x80fe}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:49 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000580)=""/147, 0x93}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/213, 0xd5}, {&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000500)=""/98, 0x62}, {&(0x7f00000003c0)=""/166, 0xa6}, {&(0x7f00000000c0)=""/16, 0x10}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/223, 0xdf}], 0x9, 0x5, 0x3) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xc0fe}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x8, 0x7, 0x5, 0x0, 0x6, 0x10000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x48059, 0x1, 0x7ac0, 0x3, 0x1871, 0x27, 0x0, 0x0, 0x0, 0x0, 0x91d}, 0xffffffffffffffff, 0xb, r2, 0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x10, 0x5, 0x8, 0x0, 0x7, 0x10000, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100000001, 0x6}, 0x10, 0x6, 0x180000, 0x9, 0xfff, 0x9, 0x1, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xf, r2, 0xa) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) 19:20:49 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r3, 0xf, r4, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r5, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0xb, 0x7, 0x0, 0x10, 0x8}, @exit, @generic={0xd9, 0x5, 0xf, 0xff, 0x3}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x54, &(0x7f0000000080)=""/84, 0x41000, 0x1d, '\x00', 0x0, 0xa, r1, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xd, 0x9, 0x7ff}, 0x10, r5}, 0x78) 19:20:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x50001, 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r1, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) syz_open_procfs(r1, &(0x7f0000000040)='personality\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x0, 0x40002, 0x2, 0x8, r0, 0xfffffffc}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfc00}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:50 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:20:50 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000040)="0db48f2a7bbb39121060071afdb5c397a815c02bd7816b2cad3a3f7e6b306d38096af0c07b55fe9621cfc0a23b7c81bafba40bf2b041f3c6bb82c913265ac04cf0159e6ab43246f10de40a94d9e22a05c83d1f315923de87ae15e6a8c6c3fd71f6c4116d53c5f66c019526cc03d44a7c7ea33e4b5e3a275857d00ce6c21f303c584b64397e2c2370532200958ef7cba3182bb3fe65", &(0x7f00000001c0)=""/87, 0x4}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000)="d63312ca5b52507d39e81a8612f230f95e65f09339436f46c8f11f68403cbfcc8f5da68d8c7879d2034953a95d1786217509941ede8e99198c36c927826aaf3c7d9524ce1e01fae873d3170224a8769badbfcf06f7fcc2ff158a26255f173e93ebe7513a5d4476cd8410b4ee85270dbab8", 0x71, r0}, 0x68) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00003d6000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0xde945000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000)="f61db6475418d5c7478f86088a9ad1e540a1be9cea53", &(0x7f0000000040)=""/104}, 0x20) 19:20:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfe80}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:50 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfec0}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:50 executing program 5: accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80800) r1 = syz_mount_image$iso9660(&(0x7f0000001400), &(0x7f0000001440)='./file0\x00', 0x2, 0x5, &(0x7f00000019c0)=[{&(0x7f0000001480)="4b25b6d6c2537383a1b3a810b7045c446035e401fe4f1b73e330bea9df49e27fca9bf08f3008b6383dec138a1b7178aa27dc371d049b0ddae8d9ae5683faff1d52235eee7143ffd709ab9d3b690583717c69c542c3d911fef4a6ea67d34a7a6b61b37f7d3f2d19fcebd202c69af4c7019ec05f924b3e3ca4db0190386d71646b19e83a715eede90c19d62e45c05a6c4aed5d3ea34ed2ca5954578fce04aebbe0bb56911cd8dfb8db38fdc6b6b11ec98e03b68adbb387388ca526fd609c9dddb4f6c6", 0xc2, 0xfff}, {&(0x7f0000001740)="c480a8b29bc7130366d2580b57296e0551b560c891c08ba60254dc52ea3574ec788b41f223bfe4fad9f07eac50862bfddae20b7aed43cf8bbe9f5b13a2c04a6105d7598d3b558b5be07f874d2e1ae59ed4b99d6d49bb9f299952b867e4e3c100afca24f4d87e2607be5fb504e6807aae66052fe7b705b3b1d3cbddc7", 0x7c}, {&(0x7f00000017c0)="d9c35141fc79cf64b4a6dfab106b1fa3d6ecaf2c5ff413397a918874e1659513c9f8da2f6ca4868e297371c025874915c630272c9e3983fa5cd30d67c44c5be5911e813dc1568319b0639c48003c1b9c0847b009627903865ab69288b84c4b562df25c306eb2a44c0f25a13929e17230afd5e54c01a3cda44ef1ed549caba512e5a5dad60bbf1844dd1fd98cf89e6ddd7118cb36ee95b9a0d6c09504c5756fff3cc82127c54a584da4d8c35ec36409ffa5effe877db6e0f687a5a763ff439231e3e5dfe9861826ca7f5d49af0ec4615f3da3a79a775fe5f3262b12765b3d2ead554693da58f1fd2430fa", 0xea, 0xa94d}, {&(0x7f00000018c0)="1e12f686c7a20b6c0d4828f9c5606d6d32bc6889b7435cd8e26839ad25e90718bfcc42e7555a88bcc86f7be83621942d5d432ead5ec2471ec0ae78939493cabe9dad3cc6675f844a40f8c2bfed0c5f49a3d491d444acbcbe47465b03e442e02b329982f0ba0e39846a429e0d84b0764c255215854e5c7cef8c96c5c18ea5dcadade0be49faf8a300c3d5", 0x8a, 0xffff}, {&(0x7f0000001980)="492af27e8d0a1d097d", 0x9, 0x7}], 0x100020, &(0x7f0000001a40)={[{}], [{@permit_directio}]}) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0xfffffffd, 0x40002, 0x2, 0x0, r2, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r3, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r3, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000003, 0x11, r4, 0x33515000) r5 = syz_open_dev$vcsn(&(0x7f0000001200), 0x0, 0x10d200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000013c0)={r5, &(0x7f0000001240)="3ad0693eaff52ed076a18089803a7a2e407e7e6eceb925084efb5974d45284837ad169258eded9f1af1d96688cc3bb22771fba1524d81b11bbc37a8f2f2a0dd5dbaeda661c043b603887eb393361bc7c517e377b74172088742f6dc5012b1abc7f910b57484a19f1f1c7b860af75ad447547c726e0442334cbb53568ee1922a85dc966306edb9152ce7eb43dda576f1d4adc008f6639a456f9c885d9284e77907363fddbc898bc070609f956ddd446b74ed76af2a5b78c672a2349a6eec4625c88e3166b44ec0305739edde35c759e59f3b8d9491eb9c863d17892dea08212de676123", &(0x7f0000001340)=""/99, 0x4}, 0x20) 19:20:50 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x204080, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040), 0x40000000, 0x341840) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r3 = open_tree(r1, &(0x7f0000000080)='./file0\x00', 0x89000) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r3, 0x0, &(0x7f00000021c0)=""/4063}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x161003, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f00000001c0)="8da3fd15d5a6f3ae69bc514bcaa699fb48d02c17cedb90dce78b6840a716750b1df46ff2f3322cfdc1ee9062e3c882d6c71476c45b8ff3aa70073a3daa87e4a2f85550c7b7820545618a67acdef1a712aa0f20dc6e4f8f7e4ac2d6cb4b42de98dd3220f79e96312c1c514addac52bd7a69bc5b83b9b446af1d77103ff9ac127e0987c59e2b5a7b99b90b8d992bb0f3720722362c5cc1d0bbbfc5ca94da1a9e4690a505dcf89cb46edd982cf06c103187bf69fcf906e4c31cdab21784634228ca2b1c434b095ceeb6aa3ff200ff1cc99af2daeaa31d67d1bd4e29431d5a7a12b76c7a8d2618b056b7a76e5e37fa84", &(0x7f00000002c0)=""/227, 0x4}, 0x20) 19:20:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xff00}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 503.862497][T25366] loop5: detected capacity change from 0 to 255 [ 504.006642][T25366] loop5: detected capacity change from 0 to 255 [ 504.124186][T25385] virtio-fs: tag <(null)> not found [ 504.137339][T25387] virtio-fs: tag <(null)> not found 19:20:50 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:20:50 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000011c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'erspan0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xd7}, [@alu={0x7, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4}, @map={0x18, 0x7, 0x1, 0x0, r1}]}, &(0x7f0000000040)='syzkaller\x00', 0x800, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x400, 0x7ff}, 0x10}, 0x78) 19:20:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x40000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0xfffffffe, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xff03a8bea8af04d5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="00760b57cf000000114104ff080000000000000012304a048057bc162254be2bf23781004d17f8519bc7e55e670f0cc4d5e0f00e87a25ea244afd3e1fc52fc9cae7311c736b95eb51e562b1d7c0670eadb62451d"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r3, 0xf, r4, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r5, r2}, 0x78) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x2801, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000003f0000007b91c0ff100000002410fefffcffffff85000000830000007590f0ff080000008f95200001000000850000009e000000c5660100ecffffff18170000", @ANYRES32=r1, @ANYBLOB="0000000000000000850000004e2a1e22000000a0806f32ffffffff95000000000000009cc98fd6cbd1f25dadc66ba1ba39cfc4cc5ad61df81e32ab12e3e9bb927b64cea3559e2c0b209ec2c03a1a77b1ca2c39146c276db0c5b92233ba7ae1"], &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000001c0)=""/255, 0x41100, 0x10, '\x00', 0x0, 0x8, r0, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xa, 0x7, 0x7ff}, 0x10, r5, r6}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:50 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x1000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x1000}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000001c0)="7d5ad352076fbd7d2348f41b5eeeec7461c1c6fd4d0835d5cb42a9628cf4bae308d6b53d6356d092c736450cbea448f71081ecf4edfc2edfc22b4fd72b9beb1093955b172ea7cc12fdc3650fd2b15ade8b24a997ee1a8ff29c859127d67ce79f69662747bfe05f940235684fa44d03a8750810a297fd23b4099276209b331d30d75d4966988f7507cb00ce48fceb18fb6efdf05f86c1e45f71a6cfd68959c9ca57ef1f57b2b2e4c5073d8c119f606cffca957bc6ecacd060919f1289ad38c7c02b202d772dc4cab00686cb2434c20a2246", &(0x7f0000000140)=""/4, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="98fc3a52fd8aa8014ac0fba911ba6fc30d3bf8e371cca018cb47a79e0041d4dd4bfdde99a421860c24e5bce1ee196a285200b1dc322a5a31bc96011b0f53e0b379f943ae459a8f25ee7c57e9e5f3802108f41d895f6ddde123d4fc", &(0x7f0000000080)=""/19, 0x4}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:51 executing program 0: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0xff, @loopback, 0xf439}}, 0xfffffff9, 0x1bc2, 0x8, 0x8, 0x8}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000200)={r2, 0x0, &(0x7f0000002200)=""/4135}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000180)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r5, 0x7}, &(0x7f0000000280)=0x8) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:51 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x4) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280), 0x10000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000001280)={'ip_vti0\x00', &(0x7f0000001200)={'erspan0\x00', r6, 0x7, 0x8e, 0x800, 0x200, {{0x11, 0x4, 0x1, 0x9, 0x44, 0x67, 0x0, 0x5, 0x0, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x23}, {[@lsrr={0x83, 0x7, 0xe9, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @timestamp_addr={0x44, 0x24, 0x57, 0x1, 0x0, [{@loopback, 0x8}, {@loopback, 0x6946}, {@loopback}, {@multicast2, 0x7fffffff}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r7 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r7, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r6, 0xf, r7, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r8, r5}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x7, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@exit, @map={0x18, 0x6, 0x1, 0x0, r0}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x400}, @exit, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0xb, 0xb, 0xb, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x7, &(0x7f00000001c0)=""/7, 0x41000, 0xa, '\x00', r2, 0x9, r3, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0xd, 0x0, 0x7}, 0x10, r8, r9}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000004b80)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000004bc0)={0x12, 0x5, &(0x7f0000001340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0x2, 0x1, 0x0, r4}]}, &(0x7f0000001300)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000004b00)={0x2}, 0x8, 0x10, &(0x7f0000004b40)={0x5, 0xa, 0x200002, 0x7f}, 0x10, r10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:51 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14, r1, 0x605, 0x0, 0x0, {0x6, 0x5}}, 0x14}, 0x1, 0xf000000}, 0x0) 19:20:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x2000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x2, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000011c0)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x4, 0x2, 0x6, 0x7}, 0x10, r1}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000000)="06b132e8f0cf3330326d7cd102c7dcb304294aa91fc05e4f74ea4c69103127b51f51454a2d37b9d7bcc7ee480e0245c71cdb9d0d40c51f4261955114", &(0x7f00000001c0)=""/229, 0x4}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000080)="4377858553c1413f075e4c328b90d7fd86783dc446ff", &(0x7f00000002c0)=""/217, 0x4}, 0x20) 19:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x7bc, 0x2, 0x7f, 0x4, 0x1, 0xadf7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x0, 0x40002, 0x3, 0xa08, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x8002}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:51 executing program 1: r0 = socket(0x0, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) [ 504.758961][T25427] virtio-fs: tag <(null)> not found 19:20:51 executing program 1: r0 = socket(0x0, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40802, 0x2, 0x0, 0xffffffffffffffff, 0x3}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x42, 0x6, 0x8}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x106e, 0x2, 0x0, 0xc1, r0, 0x9, '\x00', 0x0, r1, 0x4}, 0x40) 19:20:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000)="4fdd2a9b1c44d5b5f3dc439e0e3c213aea56153f373bbfae16904b0653198b797c692c10238d5dedd0580bf032dc53653bc78e", &(0x7f0000000040)=""/101, 0x4}, 0x20) 19:20:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0xfffffffa, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x6000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x7}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x800, 0xe61, 0x5, 0x80, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x40) 19:20:51 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'gre0\x00', &(0x7f00000006c0)={'erspan0\x00', 0x0, 0x20, 0x80, 0xb6f, 0x2, {{0x23, 0x4, 0x1, 0x18, 0x8c, 0x66, 0x0, 0x3, 0x4, 0x0, @remote, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0xcc, [@dev={0xac, 0x14, 0x14, 0x36}, @broadcast, @multicast2, @local]}, @timestamp_prespec={0x44, 0x3c, 0x2d, 0x3, 0x8, [{@rand_addr=0x64010102, 0xf9}, {@dev={0xac, 0x14, 0x14, 0x1f}, 0xe72}, {@multicast2, 0x8}, {@loopback, 0x5}, {@loopback, 0x400}, {@private=0xa010100, 0x4}, {@remote, 0xe6}]}, @noop, @timestamp={0x44, 0x28, 0xbe, 0x0, 0x6, [0x61db, 0x8, 0x800, 0xfffff98c, 0x9b29, 0x5, 0x2, 0x6, 0x2]}]}}}}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32=r1, @ANYBLOB="1d8bd41f2bb95ec9180000000002000000000000960000801837000002000000000000000000000018290000b329a11fd0d6bac42eef56017cf866e855653974dc879e877fb9e73fd392e65505a74a703d75de9712fc824cbd7506575b957e6748f23bf6ed46adb7624c4507800778373e60a6ea95500fac6eca6df2882a6a2ad123cb9b439b1d30564ac9375c21946a8a7114cdd3bf58ab7ab633463afbc52c8f8db978c9b9178ed3564817c7f1bcc07634d1f42181a149e49bd445a95a8c6fc334e9caf16027e26df6a233d86a79c5e38dcef77c59dc74000000000000000000c1ef8b77c11bf9724a6b51fc2727c743d3b8", @ANYRES32=r2, @ANYBLOB="00000000040000001830000004000000000000000000000018250000", @ANYRES32=r0, @ANYBLOB='\x00\x00'], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x2, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000180)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x8, 0x7ff}, 0x10}, 0x78) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000340), 0x3fc4522fa4355098, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x6, &(0x7f0000000040)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r2}, @exit, @call={0x85, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x5, 0x7, 0x1, 0x50, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x0, 0x5, 0x6, 0x3c, 0xfffffffffffffffc}], &(0x7f0000000080)='GPL\x00', 0x9, 0x58, &(0x7f00000002c0)=""/88, 0x41000, 0x2, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x1, 0x9, 0xfffff000}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xa, 0x0, &(0x7f0000000480), &(0x7f00000004c0)='GPL\x00', 0x39ca, 0xae, &(0x7f0000000500)=""/174, 0x41000, 0x12, '\x00', 0x0, 0x8, r3, 0x8, &(0x7f00000005c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) 19:20:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x7000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000000)="8596ff684eabecb479abebc3ef2b3dc44c40577205a73daaef12233466fedc22f91c7d948479777a13eb257628413c3128cca9112356285ebcfe469cd1863c602dd2d281d49ce8719d296c4b82fa14f3d20110aa2a2c8f7b499671ccf220ae771429d56e7787c868dbdbb508e2583571b5ec06c965cb275d62174bdf9d541d147c9f660e94462344a824d2a779a73b13fda07d2308b7255add24d5fbb6566e7e5e990b45adfddcc730293f9da7259c7c818276ae763262283e667cf5c84035a2cd4c5d36c59b8937f56494fe39cc9b64802088788fd286f776f499dedd7941a4ca525a7a036384"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:51 executing program 1: r0 = socket(0x0, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000140), 0x1, 0x202) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000001c0)="e86307cdb1d15dad39b43e034a3940871a8afc90c1df01e8e999de60e85f423909bcfb6661c1442557e303ac932710fb54648dbfc915d4da0d74248a3f28db1eec69b2e1fc4e645cca3885d9e37ffab854123ea6b9830a2ba2040c", &(0x7f0000000240)=""/101}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r2 = syz_io_uring_complete(0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000000)="4d8d72fb0738805c3aaa715f730a4e90401b95c23961b0f388f87f01f05682d5453e5a4312ad3ad469198cc8e7a4a50bfa201b3007aef6abfd95dbce2071148904dc674005e0890ff1b8f51e6acc6ae5713bebd6b62069b834379367f385d6eba43f2aba57f51cdfdafa759dfcfbcbb0d2a13630185e862920276065c89053afda2c336cb9b7d5c72298"}, 0x20) 19:20:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xc000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:52 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x4000, 0x40002, 0x2, 0x773}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x290100, 0x88) 19:20:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x100}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x12000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:52 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r0, &(0x7f0000000040)="3ffc", 0x2) 19:20:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000000)="7efce1b7087a2d44584b98da96c99c659ffa7d6bae2937686841117d4ea60d4e5d5b261c70592165e0a1d85237e2a2fd95e7d76e1befec839bd52f863c4e43de80b1d27d682808fefa1239194773d59e2e9d0a9a901aa6747d79a8678c1a448ddf4db5f2d554fa3457990836ceb68ace026d7ef8e00665b58485bb4cc4605e24759a3689ecfdb4176655a192ad432c222dc77a595fe3358d4d98caf145699826a7a0f66ea71aee97a4af57d6eafefa3ec6e2127fb0e04937b48d264362a5ee70f4bb59746ebff989fd4a13b1b561c66adba20a", &(0x7f00000001c0)=""/93, &(0x7f0000000240)="acbd1dd92a327e8614ce31851405700f322933f0b059e85f913e10cf852897e52a0a59992ac49284ae2b7bddd620d7bb6fe1350099036ae55ed788baebc3256afd1ba02ba38079324a33f0412921118bc944bc", &(0x7f00000002c0)="6c4aad5de93db4067db7e02a1e9d88ee5f426c57ff46d17a3a100ed137bfbcaa7d89f1114687b6b9481a8fd4737bf7675d97ae9ffbf012efebb2d8bcbb15c6eeada76b169d977a60f45473ca10e5c4628763de3b9f6af4906992ecc6c12c4e6f50dc6bb9a15657e32653512c58b216fc6059c1", 0x8000, r1, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r2 = openat$cgroup_devices(r1, &(0x7f0000000340)='devices.deny\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000380)={'syz0', "ab1985ee0508d8aaea92b994d12f5eee5d2fa0e7d9bfcf1e87d8a421a24a6769a1395bd38d"}, 0x29) 19:20:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f00000001c0)={'syz0', "7ca310ee8d837feb6738cfa71dd2533ed8dae1988c574750083fe8decbf06a58b58c37ac668bea3960f1e65e71113f999b16cbfd0a28dd4383586692696653ae1b43d52b709e85425a73d3fbdfe88fee2e618c143033047bc50b66da6bd32888158534232d90bb7281a3c53c013eb374c2"}, 0x75) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @remote}, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/mcfilter\x00') r3 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) preadv(r2, &(0x7f0000000740)=[{&(0x7f0000000280)=""/15, 0xf}], 0x1, 0x5e, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r4, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r4, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x3f000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:52 executing program 1: r0 = socket(0x80000000000000a, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_ext={0x1c, 0x9, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x10000}, @generic={0x27, 0x9, 0xf, 0x8, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x1000, &(0x7f00000011c0)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xb, 0x1}, 0x10, 0x985b}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:52 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x6e000, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x100b, 0x2, 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) openat(r0, &(0x7f0000000080)='./file0\x00', 0x200082, 0x4b) 19:20:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfc000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r4) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r6, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r7, 0x200, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x16}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x24}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x71}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x44840) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x4c}, @ldst={0x1, 0x2, 0x2, 0x8, 0xa, 0xfffffffffffffffc, 0x1}], &(0x7f0000000080)='GPL\x00', 0x100, 0xdb, &(0x7f0000000140)=""/219, 0x40f00, 0xc, '\x00', r5, 0x5, r9, 0x8, &(0x7f0000000240)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x10, 0x9cc5, 0x1ff}, 0x10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, &(0x7f00000031c0)=""/102399, 0x88b7f163274527f7}, 0x20) 19:20:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0xa11, 0xffffffff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffe}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) syz_open_dev$vcsa(&(0x7f0000000040), 0x31a, 0x10802) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) getsockname$packet(r1, 0x0, 0x0) 19:20:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r0, &(0x7f0000000000)="3fac", 0x2) 19:20:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@rose, @rose, @rose, @null, @default, @bcast, @default, @netrom]}, &(0x7f0000000080)=0x48, 0x80000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x40010, r1, 0xf3bc7000) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r2, 0xc06c4124, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:53 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x6, @local, 0x4e24, 0x4, 'dh\x00', 0x20, 0x0, 0x1f}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0xffffffff, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:53 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfe800000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x5, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x16, 0x1, &(0x7f0000000240)=@raw=[@call={0x85, 0x0, 0x0, 0x89}], &(0x7f00000002c0)='syzkaller\x00', 0xffffff00, 0x61, &(0x7f0000000380)=""/97, 0x41000, 0x16, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f0000000400)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xf, 0xa44f}, 0x10}, 0x78) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) r7 = dup(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1d, 0x0, 0x7fff, 0x7, 0x0, r0, 0x3, '\x00', r6, r7, 0x2, 0x3, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000)="41b3a80fb121625c517171", &(0x7f0000000040)=""/54, 0x4}, 0x20) 19:20:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x14, 0x0, 0x40002, 0x0, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000040)="b54f6306652d95128f4e535ebc7fb41035125ad23e11e60791fb09a1d001633bfbc6e80fff9c946670ea96bcc02b96156ec0", &(0x7f00000001c0)=""/169, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r0, &(0x7f0000000340)="c03745259c027f1d11ea6fc2", &(0x7f0000000380)=""/191}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x4, 0x3, 0x3, @mcast2, @empty, 0x20, 0x700, 0x0, 0xffff0001}}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0xfffffffd, 0x4, 0x8, 0x400, r2, 0x101, '\x00', r3, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x40) 19:20:53 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xfec00000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:53 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rng_core', 0x1, 0x24) pwritev2(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="bb33ee903ed32d571525a35091f45961d6c8029325b2ed4b415f61c00408335ed3875ebeb82661d5fa5aacba408982547aee15c67b25189158a00c5befe475ebad216161976c20ba0d4eec50ccb2aba05f50f693114fb701dd423f7ad659e9995bcfffdcdb006408814d6ea507fd51a65c7e3342b3f42d322c95ae2b55c9f8e77a3500d2507ec0e14c0544e231339816", 0x90}, {&(0x7f00000001c0)="3cb4219e61d2575c0d69be9bf1116dbfda43d0477c0b6f1a931384fa1446d52a8f0a93e6e6b3c5369772b5ea7e0362214ff5189c1b543c32387904038d28923a9a25c10180e17f2d410543c78ae356970a2892ae489f54a28212f82db257396ef3083225ed1a8b2791ffab50a8fececa237e4ab6ed5cc8b695a95b2ff31ce7ed86510f32b1c4847ee093467720c9b54951889e3f29a3c4f4e98ee1f2278166211993a7a033fdf396e112d31d6a50db110cb4efa77662266f7aaa59298097022e0cc245712207358124abe7eca21cb6157bad8a0e41c5b5d6aa83c9e1edfe0694543ca0519588ac11ae91ea", 0xeb}, {&(0x7f00000002c0)="748343316fde56b7bf1cb7c48a6e37f0a75bb70604c2aa027674947687b34bb93aabbd534ff14c5b28e90dd13071f149b235c39ece2e8c328b1c3ac0e4e5c1f1190bc022317bce980253cf671a91795a39361f8e61b62b2dd445276913d3ea372ea58eec2a5d934165b0f6786355fb7d2135e7301c268e90ac70af878e602663a59f3887946be7c02debe6bfe87a4f2d4451926a007b74fa9bc60a", 0x9b}, {&(0x7f0000000380)="809623103101ac7e20294cd8d3848f268c4dbc92b226141734b3a6343ee907a9a00bd1367f21a9ef8c0acd2a7d057c8be4b94c1957fcbfe1be59ad6db7fbe4eae4b485926cdfef9c8748aa8612190548c26b1e493a2e9ad54fa12776dbb3b727b5755dc54c7a9d754bf034665237133e253bb03bfe68490137f7c41a0b9b3a751c585109f22326bfd0f8efc640462127139cafcdbc0c0b50cf8e9ba3c066bac9cdc1498f10c403d7afd9a1312437128b4140245cbfb54f64a864472da8985f020cae5b0b879d4e43033171b7765a012a9898236b5ab08a8c30eb9d72", 0xdc}], 0x4, 0x5, 0x3ff, 0x18) mmap$binder(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x1, 0x11, r0, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x16, 0xfffffffe, 0x40002, 0x23, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x40000}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:53 executing program 5: ioctl$SNDCTL_TMR_STOP(0xffffffffffffffff, 0x5403) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) r7 = syz_mount_image$reiserfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', 0x800, 0x2, &(0x7f0000000580)=[{&(0x7f0000000400)="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", 0xfe, 0x4}, {&(0x7f0000000500)="bd5573067c3a73b10b5c7e0dea281852576d668662506bbf04b419b536d9351f193028dacfc33ba24f3f1958a8a0686db1d2538fe56992354083d99fe19f588b90544e58f373b92b7201d25c9d0c9f", 0x4f, 0x1}], 0x2009, &(0x7f00000005c0)={[{@hash_tea}, {@usrjquota_file}, {@nolargeio}, {}, {}, {@jqfmt_vfsold}, {@balloc_no_unhash_reloc}, {@nolargeio}], [{@subj_type={'subj_type', 0x3d, '.{%%'}}]}) renameat(r6, &(0x7f0000000040)='./file0\x00', r7, &(0x7f00000006c0)='./file0\x00') sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000380)={'ip6_vti0\x00', r3, 0x4, 0xdd, 0x4, 0x401, 0x8, @private0, @remote, 0x1, 0x8000, 0x3}}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x0, 0x4}) 19:20:53 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:53 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0xff000000}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'gretap0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0007780000000005000001ff457a001c0066001414bb44078a5058fb3500"]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18150000", @ANYRES32=r0, @ANYBLOB="000000000000000018270000", @ANYRES32=r1, @ANYBLOB="0000000000000000850000089d0000008500000086000000183800000300000000000000000000002974ffff12000000850000004400000085000000a4000000"], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000003c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x10, 0xf72, 0x3}, 0x10}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f00000001c0)="9e366a76d41dce72cd14b4d881e31460085a0b1d259e44b86681d5c4937042437645efdc6228f939ad74ea62c835eddc9f262ffadd4d552aa85ea66dae721e072f9724434a65a0108c34b7bdffdb026ee2cd0974e1f2ad3f5f524f71c3f48a461555b8590ea85fc3bdd3b614108ce2d024e3521f23527c43816c0e23d3d9ce77507aa1e91477eeccd4e7567bb93aae00fb0c94d28b202eb241a7f3aeb25163bdbc51033c72300f8847264658006b3c9c9a03d2e57cf0ee767468ae45ed710937ec02b8cf06bc743208ce51ef64dbbea1d1d0ced2a4fd98a544006f63cab8770a789125103506ec04dda4c6be89dadb", &(0x7f0000000040)=@tcp=r5}, 0x20) socket$key(0xf, 0x3, 0x2) 19:20:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002440)={0x2, 0x0, 0x40002, 0x8, 0x2, 0xffffffffffffffff, 0xad7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) r1 = syz_mount_image$gfs2(&(0x7f0000000080), &(0x7f0000000380)='./file0\x00', 0xfffffffffffffff9, 0x3, &(0x7f0000000580)=[{&(0x7f00000003c0)="8976facbba4755b6a9a9cba24b2c509f629415388eeac8e8b26994b388b2994ed1cdfaf51e5da53a61a150f47d6588e278be7af750f44d4ecbfc399788f7626929d2bd85adc658632b806b51b50ba41868d200b384949a522f7450dc2d119dc3af201bf65cca7f20f5d5b25295acf9bf6e7e136c4fae5dfdff5672e9fe8161a4af217b0d0dad31c1eff76e93badd4139880238f974", 0x95}, {&(0x7f0000000480)="a1946399804391cbf9a688516a664058b9779488d320318fbf0bd64b1ad090f6f491535841e073385f4bd86dbe9f5beedfd604dd1feda4b5971f8dbbdf06e9d9e42e2aeb60b096b537eb97c06e16dcc52a729350f0f5cee9d06c1582cd0a6d058b42", 0x62, 0x8}, {&(0x7f0000000500)="b76cabecc2c97cc22d9c20a853ed8018b2d80ae404baf45387ef3202b216b6f06a45552c0ffd4d74bb618b5a8d2d28ec8bc820ce5b5f7ee2182be720fc85141079e6394175", 0x45, 0x40}], 0x1048880, &(0x7f0000000600)={[{@upgrade}, {@noquota}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '\x00'}}, {@context={'context', 0x3d, 'user_u'}}, {@obj_role={'obj_role', 0x3d, '/dev/nullb0\x00'}}, {@euid_lt={'euid<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/nullb0\x00'}}, {@seclabel}]}) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r2, 0x0, &(0x7f00000011c0)=""/4078}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000900)={'syztnl0\x00', &(0x7f0000000880)={'ip6gre0\x00', 0x0, 0x0, 0x6, 0xfc, 0xfffffff8, 0x20, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x20, 0x6, 0x3}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff33a70e4dc4193cac18e78551e6ae5dc926959b167fc09e23ec3679d818a05d29fe4df3f31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb58b070440dcff74c4c00b0e13212a55db69f2a6bdc6f9baf4ca444f46ac0af3f519cb8ce0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b2a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1dee58e7ef72e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a0142d3a0cfbef22b1a264c62328e5f93aa752b9780f51b079312eec1c06917a4b9aba"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000009c0)=@bpf_tracing={0x1a, 0x3, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc8f4, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000700)='GPL\x00', 0x3, 0xc5, &(0x7f0000000740)=""/197, 0x41000, 0x4, '\x00', r3, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x5, 0x3, 0x400}, 0x10, 0x28d9e, r4}, 0x78) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, 0xffffffffffffffff, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f00000022c0)=0x0) syz_mount_image$fuse(&(0x7f0000002240), &(0x7f0000002280)='./file0\x00', 0x0, 0x0, 0x0, 0x10c5812, &(0x7f0000002300)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0xfcc}}, {@max_read={'max_read', 0x3d, 0xd88000}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@subj_type}, {@pcr={'pcr', 0x3d, 0x8}}]}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x40080}, 0x5) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000021c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000002200)=r7, 0x4) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0), 0xa00, 0x0) close(r8) [ 507.408068][T25603] loop5: detected capacity change from 0 to 4 19:20:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)="f5bd27e6bfee60b1b118ec279768b829fb95175be3c77f4a8b03689272280939106e5bbe8f8a8d7b908c0f8badd6b6b37e8b5f3049c46b6a66b4a3cc4474f678256394564550e386209a62e44aad3a7f0c0f490a2448d8c324723a29398a3b481ca2dff46222d2e2b7c81834cc3de23b1fdfbb5ec53ac267d3ea6afd5147201ceec163cd9fbb1c0de35fa3ecf2c20fe94b0331ca3ae15751b59f6a56aa2db708d28abb45d71953d66048a4f6ef1d853430b01755d4b981315507546c588dd6b504acbab68b331ace08945ba82cd5250581aae3a2bf44557f54d787dc1dfdc0d8d911fa61f120b556197e6f17694d89a7ea5b", 0xf2}, {&(0x7f00000001c0)="5b791eeebf8d176321d68b7c7695878495dc7226336d5bca5370570b59d6d938faac76c3d475544b001ce54ddf036faab79a520f608f004dbea0a13da025b2409c5c9fefe35ee0b6e36c008142c8793c7cb08173de9849837a8205f805016127ee42dde4f8be8299639f3a003be67c9ede225f3aa1c0abf13d72757b0937e61c978e44ed4f0b06b47b63cea3f935331e9cf85bbbdfa6acdd220ca30e685cfd9cc6526c7eda04e4aa86c5dead7798a56ec89e3bf86d3cfe017a3f8f8d07bd6a068e468d7e5ebb71dc1ae00eade985e33c006dfe47a3d834f3a684a4323df2c3d46e3451cead2b268368b26a15cd48", 0xee}, {&(0x7f00000002c0)="423b95ef5305ffbf891e885bedc3f8de18047076f82f70c6447528d7c3195d84a147823e1f15cf0a7a25e3d28a7524a4ed236461c869c7fba73872cac9e5696e7ec162312da80fbd4a8b3a36facca908da092469a8f75dd98ac769313070e57a4995936f02cb29befd4632993a11463591babe5e5fb54a8a6c78c220ecc14f88a0f4f6d02056eb518d9bcf1896c9441d28ae63a23432d4fb7683e3d6c8c770aa131fd0fddbb9dd6a2ee15a03297ff78a065f105eaceb20d49a3106a3bfa24e7f4c7206e1bf4e92e406d1eef782bdee", 0xcf}, {&(0x7f00000003c0)="ad339675883dc25c316cfb208cd870fd55969287aebe56ffee68484b1eff6840e9b1a02a7c14c37266960a917ff17c18b172991ee89251fe6d4698833bf821f8daff46fe33b6c85ba844a0c4dd4bb4794c156de74df5fb74253f2d97d3deb6f74fd7ab78a3a6bf7ed19d8816a83e73f5b8c009f43fed0029e2556c882abeedd399ea0e4ba6d096239c3498ebec5e5ef48893801244e680742214d11ecc5e983755218765ecff497abcc820bfa623a7b7ee2bb92a09bbe278d199f925bbfbfe63c96c", 0xc2}, {&(0x7f00000004c0)="0737da7bd3884181de70380ff2a382f1749cb42309880863cd4903032fdd919c4a6ab024227c65fca80c7a3ea9a83065a3d993370804e691905d316bc46358b2321f060dd473209c10a6c6646dde88b3fbb23e666953", 0x56}, {&(0x7f0000000140)="1c5e4d619d4603128dfaf8249c67e7165b23208f5e7e4d88b7d1db", 0x1b}, {&(0x7f0000000540)="58d15dfaf3b55643a4ad71fe7506ec064bda331a6517fd47797346556366aea65323d832d7078749012e04a95eaa23699740dcfd9a280b9f1e274bf2bbc4615d85dd8f41a3e3e68c5cf15716f62baf0d576dfa83c3ecf00d0a2fee1e7e89f890c90563cf6b80c3f0d9895ba84ce52d2fa36ea61a767536576f66252d4d473d456394460c18b6958126b0f354429b7e62943abd6195f6153429a0937111759f31495ce894a1b8", 0xa6}, {&(0x7f0000000600)="7b3b06e5537a6e82ad62dd7205fa064f9a909d4a5e34c39b8d63cad89d5ff2bad21c9cb324ca546f328553018c1a4faa3fcdee1fa49eb73ec5bf0a6999a0b3832a7e96142e30c4c2cb3bed5b281a7ab131f3e8fd22a394f2ed766b", 0x5b}], 0x8, &(0x7f0000000700)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x88, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0xde, 0x3, 0x6, [{@multicast1, 0x1000}]}, @rr={0x7, 0x1f, 0xe6, [@local, @private=0xa010100, @broadcast, @rand_addr=0x64010100, @multicast2, @dev={0xac, 0x14, 0x14, 0x2a}, @private=0xa010100]}, @timestamp_prespec={0x44, 0x4c, 0xd7, 0x3, 0xd, [{@remote, 0x6}, {@multicast1, 0x1}, {@broadcast, 0xfff}, {@dev={0xac, 0x14, 0x14, 0x1f}, 0x7}, {@rand_addr=0x64010102, 0x1}, {@remote}, {@multicast1, 0x9}, {@empty, 0x8}, {@broadcast, 0x2}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x90}}], 0xe8}, 0x4000001) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0x2, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="b90c3d4e9d581b7e65b575580d33cc61d699638818394aac0bdc99215b1c4449e2149d4640281d716910f1539abf0b2c87b6a39188050844637d05", &(0x7f0000000040)=@udp=r1, 0x4}, 0x20) [ 507.575353][T25603] loop5: detected capacity change from 0 to 4 19:20:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x8000, 0x189) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f00000001c0)="a7e51f95aefdcffc0c1b92271fdea29f9d3794910cce3e1c39bab7c51ce2180b79889f3dfe68b4152afde0222c7bf2c77a81f77283d6af293f0bb61b47b18c34681860ebf39d014e2b844081367a36e115773e569c226f9066b0924896522616ae0edd58c423a1560db9a0116bb376751c6daeb1acfce8f60a80a67c91ac65cc4995fac53993cbec805164970b28eefc11c6a1fab4b155b76c22693feb7d5c2c0be31541ea57ff1efdc10b024821a1bb2c33e3c313182de2b3ae07c5c63dd00259", &(0x7f0000000040)=""/21, 0x4}, 0x20) 19:20:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0x1b, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:54 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r1, @ANYRES32=r1, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x30c3720a464b255e, 0xffffffff, 0xfffffffe, 0xfffffffe, 0x0, 0xffffffffffffffff, 0x5, '\x00', r4, 0xffffffffffffffff, 0x0, 0x4, 0x4000000}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r5, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r5, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f0000000000)="58a8988f0cda613a5b80d9d895ab7500e966b26ae65efb894f22061d0322c53d91261e4b835b3e8c93e5c1018add8337a16d18aaa3f9eaf4ddef57578aeafd12f900b3dbef24f5266039691dbcbfaadc0c884c32a586d421626be336c3816194304bf6824556c8", &(0x7f0000000080)=""/96}, 0x20) 19:20:54 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:20:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="3689523a428d6cae6c3de5707cf62d1773b015ba166948de3d0ee4e9f01252b0baf917451bc01ec84227e898af00fb42df4ac11e4185efdb853434ca8901657e4fd5952e1e5bced8c5b52fce34059bf610dcef878624ac3d393fb6cf1568327eb578b105fd33c267fb748d001339d496f16f531a6b499368a24a88b07022774e4dad628c4816c42ee2861d5a7564dabfc62a4a4aaed277489707e1", &(0x7f00000011c0)=""/4096}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:54 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:20:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=ANY=[@ANYBLOB="3c0000001000850600000000e9ff4d0000000000", @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) socket$netlink(0x10, 0x3, 0x4) 19:20:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x3c1540, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000040)="ff08cbe1cc944b4dfa771921075e6400d838cd655d83021fb00ff110f3e6411d8da07988c47851b3b03325aebd2c3ea1e7c3fc814ccab201499379bd4464c46072d9064b16b102d438f1a88642a2ea3dae6b2cb42095cfec0961e8b3d48adacc3c0ae4", &(0x7f00000001c0)=""/81}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 508.206970][T25671] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x3, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@map={0x18, 0x9, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @ldst={0x1, 0x2, 0x1, 0x9, 0x1, 0xfffffffffffffffe, 0x4}, @call={0x85, 0x0, 0x0, 0xa3}]}, &(0x7f0000000040)='GPL\x00', 0x5b, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x1c, '\x00', r2, 0x0, r6, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x8, 0x8, 0x7}, 0x10, r7, r8}, 0x78) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:54 executing program 0: fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000031c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x29, 0x50, 0x7, 0x5738, 0x9, @mcast1, @loopback, 0xff38, 0x701, 0x1cc, 0x3ff}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/irq', 0x0, 0x40) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0x4, 0xb, 0xa, 0x6, 0x10}, @ldst={0x2, 0x3, 0x2, 0xa, 0xb, 0x30, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0xfffffb29, 0x1000, &(0x7f00000011c0)=""/4096, 0x40f00, 0x10, '\x00', r1, 0x17, r2, 0x8, &(0x7f0000000200)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x3, 0x2, 0x243}, 0x10, 0x1e20, r3}, 0x78) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r5, @ANYRES32=r5, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000004400)={'ip6tnl0\x00', &(0x7f0000004380)={'syztnl1\x00', r8, 0x2f, 0xfe, 0x5, 0x401, 0x40, @mcast1, @dev={0xfe, 0x80, '\x00', 0x27}, 0x700, 0x1, 0x0, 0xc0}}) bpf$PROG_LOAD(0x5, &(0x7f0000004300)={0x5, 0x1, &(0x7f0000003200)=@raw=[@exit], &(0x7f0000003240)='GPL\x00', 0xff, 0x1000, &(0x7f0000003280)=""/4096, 0x41000, 0x1, '\x00', 0x0, 0x5, r2, 0x8, &(0x7f0000004280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000042c0)={0x4, 0x0, 0x1, 0x3}, 0x10, 0x0, r4}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x2, 0x0, @empty}, r1}}, 0x48) [ 508.345941][T25671] device bond1 entered promiscuous mode [ 508.385803][T25695] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 508.425478][T25695] bond1: (slave vxcan3): Error -22 calling dev_set_mtu 19:20:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4, 0x0, @empty}, r1}}, 0x48) 19:20:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:55 executing program 0: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000000)={0x2c7, 0x0, 'client0\x00', 0xffffffff80000001, "33d94cf649a55665", "e181fd9292181ec8d966195652191413403ee5cd267d6c4359cc2523ae129030", 0x9, 0x8}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x13, 0x0, 0x1000, 0xb, 0x1210, 0x1, 0x23}, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000001c0)=[{0x1, 0x8, 0x5, 0x81, @tick=0x6, {0x3, 0x80}, {0x8, 0xc6}, @connect={{0x5, 0x9b}, {0x7, 0x64}}}, {0x8, 0x3, 0x37, 0x3f, @time={0x4, 0x5}, {0x80, 0x1}, {0x1, 0xff}, @connect={{0x5, 0x7}, {0x7, 0x3}}}, {0x5, 0xf4, 0x8d, 0x1, @time={0x6, 0x6}, {0x5f, 0x1}, {0x1f, 0x80}, @raw8={"31ccba75103eccc8b819c6d4"}}, {0xff, 0x1, 0x8, 0x40, @time={0x7fffffff, 0xed4}, {0x6, 0xff}, {0x3, 0xff}, @quote={{0x1, 0x1}, 0x9d6, &(0x7f0000000140)={0x40, 0x81, 0x6, 0x7, @time={0x7, 0x6}, {0xf1, 0x12}, {0x0, 0x4e}, @quote={{0xff, 0xe0}, 0x5, &(0x7f00000000c0)={0x11, 0x7, 0x6, 0xfe, @time={0xb4, 0x4}, {0x8, 0x9}, {0x1f, 0x1a}, @note={0x40, 0x6, 0x8, 0x27, 0x3}}}}}}, {0x1, 0x0, 0x25, 0x3f, @tick=0xfffffffb, {0x1, 0xfb}, {0x5, 0x1}, @addr={0xc1, 0x20}}], 0x8c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 508.557843][T25671] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x50}}, 0x0) 19:20:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x1ff, 0x82}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = eventfd2(0xfffffffe, 0x1) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) poll(&(0x7f00000003c0)=[{r1, 0x10}, {}, {r2}], 0x3, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x81, 0x81, 0x6, 0x54, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, 0x700, 0x7, 0x401, 0x80000000}}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="180000d815ae69000000000001000000180000bc4885e67e42f7506ccc6c0002c1000008000000050000ff094f0100ff0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x1f, 0x29, &(0x7f0000000080)=""/41, 0x40f00, 0x19, '\x00', r4, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xa, 0x54, 0x6642}, 0x10, 0x0, r5}, 0x78) 19:20:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7f}, @ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x40c8801) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRESDEC=r1, @ANYRES32, @ANYRES64], 0x2c}, 0x1, 0x0, 0x0, 0x423487cf9bb9c391}, 0x20008001) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r5, @ANYRES32=r5, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42c0d}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x2}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000d00)={'sit0\x00', &(0x7f0000000c80)={'ip6tnl0\x00', 0x0, 0x2f, 0x60, 0x0, 0x6, 0x40, @mcast2, @remote, 0x7800, 0x700, 0x5, 0x64c0}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000d40)={&(0x7f00000011c0)={0x580, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb835}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x114, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x104, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x5, 0x3, 0x3, 0x7}, {0x1, 0x9f, 0x1, 0x1}, {0x4ea2, 0xdb, 0x3, 0x2}, {0x9, 0x6, 0xf0, 0x2}, {0x1000, 0x0, 0x4, 0x24}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x3, 0x1, 0xff}, {0x95, 0x20, 0x0, 0x7}, {0xe15, 0xd4, 0x1, 0xe9b}, {0x6, 0x40, 0x3, 0x3f}, {0xdccd, 0x2, 0x6, 0xffff}, {0x400, 0x4, 0x2, 0x80000001}, {0x5, 0xc4, 0x80, 0x5c98}]}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x2, 0x9, 0x358}, {0x4, 0x5, 0x0, 0x7}, {0xfff7, 0x3, 0x9a, 0x400}, {0x7d5, 0x40, 0x3f, 0x8}, {0x8001, 0x81, 0x13, 0x4}, {0x88, 0x6, 0x6, 0x6}, {0x401, 0x6, 0x7, 0x8}]}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x148a19fb}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r9}}}]}}]}, 0x580}}, 0x88c0) 19:20:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x6, 0x0, @empty}, r1}}, 0x48) 19:20:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x7, 0x0, @empty}, r1}}, 0x48) 19:20:55 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f00000011c0)="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", &(0x7f0000000000)=""/126, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540), 0x8000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x154) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xa, 0x1, 0x0, r0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @map={0x18, 0x8, 0x1, 0x0, r1}, @generic={0x20, 0x8, 0x0, 0x7, 0x8}, @call={0x85, 0x0, 0x0, 0x2c}, @generic={0x1, 0x5, 0xa, 0x0, 0x3}, @ldst={0x3, 0x1, 0x3, 0x0, 0x9, 0x4, 0xfffffffffffffffc}]}, &(0x7f0000000600)='syzkaller\x00', 0x4258, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0xb, r2, 0x8, &(0x7f0000000680)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x6, 0x800, 0xfe}, 0x10, 0x0, r3}, 0x78) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x41) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r4, &(0x7f00000001c0)="2d7d21e787d77ea9ab3c276650fb917210d29a55810d1bf948fafe624cd00610b3f65832c44aa3c8d271348e3d3b563445543a188f3b442cd34d8c305bf3a8af198da2093ef3c35229634b307f3901bddf012993a62335a9975a23d7e1074851ff136d4a8fc2c8e32ada9304a37e1b9ee9a3174a56d5ebeddf775114f3c5224a34d5d4d7f06dd46f8c975663ab11b4b34cf6d99ac91fffde435e17f8a28147ec44a2f6f609c92d7fdf036a2c5a6b470fa4a403f157004e1da2ba83d4f48980f1d6e2536468830823931b075fe2dfa65426c4b51deb7ca92eae2e26095dd1835dc74250115f403a5779da5b747b308ee925c32221bd36add0db8f", &(0x7f0000000080)=@udp=r5, 0x2}, 0x20) execveat(r5, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000500)=[&(0x7f0000000380)='*\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='#[\x00', &(0x7f0000000440)='%:{-)\'^\'^-\'){@!/\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00'], 0x1000) 19:20:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0x0, 0x40002, 0x200}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18400200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@gettaction={0x5c, 0x32, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0xeb1d640cd96f0928}}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0x14, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0xfff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400c040}, 0x0) 19:20:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xc, 0x0, @empty}, r1}}, 0x48) 19:20:57 executing program 4: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x2000000}]) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) syz_open_dev$sndmidi(0x0, 0x2, 0x0) fsmount(r2, 0x0, 0x4) io_submit(0x0, 0x4, &(0x7f0000002300)=[&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000000980)="0a9de657ef6ccf63383a2accee7dcdad581bc365cd1713e4f319d828a0afc778", 0x20, 0x80, 0x0, 0x2}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x1, 0x4a, 0xffffffffffffffff, &(0x7f0000001080)="cc07ef18ea4ded87578e6c2db6546feaabc6724be6c84df2191baf2785e1ba76eae9d6bec482091c5fb404afad9ab8b465be9427ca4747d7f42fad4e9ca95e2f6fd620dc727237792f7e8434bb5202bdaf9fb805650991f50d922cedff9579dfa82b06831bb9b456548aa9401521c7b33178286183228f10f232f092c6b28cd314a97f3a13851a992da63847a282426b13a9c4dd6a7cf0348a6469632618e1be89", 0xa1, 0x0, 0x0, 0x2}, 0x0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000021c0)="d74d54a17200a818c5429223865cffa77a85da94301f75166cb5a1c161f45393b4ac88e5a9f31ac3907679cbe915f4ec2ac80adac3b5033904132cac3bdb85f9b8074b339704e4cb890a6628bc43f26f2fd3584be743155276582311ccf49f2b9251cd3e89abb8aa7f74c39ab8fd0527c4beba90298e2a779fd9e9a6cea492ec1c5ee3906aca635d2b9ecba5a1a1c727bc9ce766879d9f85cc23674bcb5327a5f7abde0a7aa85d0b719253b6d25aa5170c11ef2fd1060b8b0bcf9c", 0xbb, 0x1, 0x0, 0x1}]) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) write(r2, &(0x7f0000000d00)="81310270176b8ae5e8d134a4f196cfcce91cde3cb093dc2ebb9bac209c6debdb5bb23a9e73e4c6183a3460c98f4bfe46256f26f804f4a34c0a27f102c91f62120330332142e5d8f9abb266bcfe24e5fd0b889eb5a1ce57f1b66238a3522401a4b208b3b3460a22d737", 0x69) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, 0xffffffffffffffff, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10) 19:20:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={0x1, 0x0, &(0x7f00000031c0)=""/4078, 0x4}, 0x31) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x19, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7f}, [@exit]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x55, &(0x7f0000000200)=""/85, 0x40f00, 0x36, '\x00', 0x0, 0x13, r1, 0x8, &(0x7f0000000280)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xf, 0x101, 0xc3c}, 0x10}, 0x78) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000)="75e3cb85a8d09b3583117919534749b875b31892cfa0cfd6976c48d0ff134ae9a72fe701509a384032a23349654b9d58833bc832bd80a2f7a616a9706febaa54a146684ea7328baebd645cbe3ed25e7e3e0510572c9569bc69833fa1e2033ca0c1e8f2555135bb870c641f4179a6b4f775070413272e7b26169456c052c951d3d065335937f9093c504f05fa28cac1d1ce63574664d5374f29318323affcb7c655153b1ef521117d1bbb89e6add08643e279fb4c77b07dd6b2c869de8b4ee6af", &(0x7f00000011c0)=""/4096}, 0x20) 19:20:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x5c}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x29, 0x81, 0x6, 0x24, 0x59, @remote, @private0, 0x80, 0x80, 0xa86, 0x4}}) r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x28b4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000900000000000000ff030000182a0000", @ANYRES32, @ANYBLOB="000000000700000011410400fcffffff0800000000000000"], &(0x7f0000000300)='GPL\x00', 0x1ff, 0x9d, &(0x7f0000000440)=""/157, 0x40f00, 0x12, '\x00', r5, 0xf, r6, 0x8, &(0x7f00000005c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x1, 0x48d, 0x8000}, 0x10, r7, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0xa, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x7}, @generic={0x7, 0xb, 0x4, 0x7ff, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x8f}, @jmp={0x5, 0x1, 0x7, 0x7, 0x5, 0x30, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x14, 0xaf, &(0x7f0000000240)=""/175, 0x40f00, 0x4, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x9, 0x7, 0xb8}, 0x10, r7}, 0x78) r8 = signalfd4(r0, &(0x7f0000000000)={[0xbfc]}, 0x8, 0x800) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r8, &(0x7f0000000040)="894164e094fa8817564f53b5a8712fa224f9ff9da6d1e75a1bb07af3bc1b3c91352659fe496c3fe1e7d036e5383c719390927d58ff082d94bdc9ff1182a46895bf7e50da798e047007ba7b2beb", &(0x7f00000011c0)=""/4096, 0x4}, 0x20) 19:20:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x12, 0x0, @empty}, r1}}, 0x48) 19:20:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:58 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x50, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x809}, {0x6, 0x11, 0x2}, {0x8, 0x13, 0x7fffffff}, {0x5}}]}, 0x50}}, 0x20000004) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x9, 0x40002, 0x2, 0xa, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000021c0)=""/4083}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) getsockname$packet(r0, 0x0, 0x0) 19:20:58 executing program 4: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x2000000000}]) syz_open_dev$sndmidi(0x0, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000d00)="81310270176b8ae5e8d134a4f196cfcce91cde3cb093dc2ebb9bac209c6debdb5bb23a9e73e4c6183a3460c9", 0x2c) socket$inet_icmp(0x2, 0x2, 0x1) io_submit(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, 0xffffffffffffffff, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10) 19:20:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100766c616e000020001c00028006000100000300000400030700000200100000000100000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x5c}}, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r7, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x9, 0x0, 0x0, 0x0, r1, 0x2, '\x00', r6, r7, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xfc, 0x0, @empty}, r1}}, 0x48) 19:20:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f0000033740)=""/102381}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:58 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYRESDEC=r1, @ANYBLOB="33208b4bc67e9cec452d6a04747abd72b704e04fb75e1a7f0191724bebae8d18a2fff0c43601e94706090064ad76a09696cf0e9e11b5766202d4b9f27663f0b94b2ceb2a28d8c20ed996e67add9c8ce9605d6d4ba8f61932730c599f0706f3999de850ce1df2cd49fe", @ANYBLOB="b8a892c48de3f41bee64000000004f8bffae447d55f800000000"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240), r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x1c, r3, 0x20, 0x70bd2a, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058840) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440), r4) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r5, 0x20, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x7000000, 0x10001, 0x2, 0x80000001}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8830}, 0x4080) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r7, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r7, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x600, 0x0, @empty}, r1}}, 0x48) [ 511.734297][T25836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 511.819400][T25846] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 19:20:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x700, 0x0, @empty}, r1}}, 0x48) 19:20:58 executing program 5: fallocate(0xffffffffffffffff, 0x3, 0x8001, 0x5) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:20:58 executing program 3: fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='trusted.overlay.nlink\x00', &(0x7f0000000040)=""/184, 0xb8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x400200, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x100, 0x1000, 0xfff, 0x80, 0x1, 0x800, '\x00', 0x0, r1, 0x3, 0x4, 0x3}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)="c3206a55b436e8947b3522f8769996aee481611095c6bb07d8b7393ad4eef4696c132e37b0567aa9109df5709beccd4c870682c291a6f69f23cc6e5e700866cf8040bdb432f94a98dc2a6df7", &(0x7f0000000080)=@udp, 0x1}, 0x20) 19:20:58 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:20:58 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xc00, 0x0, @empty}, r1}}, 0x48) 19:20:58 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x18082, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x40002, 0x2, 0xe04, r1, 0x0, '\x00', 0x0, r0, 0x3, 0x40}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r2, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r2, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000080)={[{@gid={'gid', 0x3d, r1}}]}) 19:20:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe, 0x0, 0x40004, 0x2, 0x0, 0x1, 0xffffffff}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) 19:20:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="dd98863e5dd1e632f804f0a1de4bed7639a2c4a78c33802669b61881f921dbd6dca75b4cd7f09f80ede51bc53b2e77074638f53c56dd07dd696dedc1e1e44185670e8e264797250669df2d55fa167c892a9d7d59a65a5adf92b921bc4861fc79ebe36a83732b3afc817733c44ee80d38ca142cb5769c5806163d92e8c683e3cfb7b51586829273c3a979f5da83276460f5a69aeb3a954fbce37ef0b936dbed3f9b8651032f0a32677774141931b5f17b55dfc02f4ccf079c6eb1f976925ee75dbd6c9589ed8d215c6628a96c6bfb2cf42c9dd99377c68f537b44b30287204d1ef9708324f1e0378c958fa66140663da1e2", &(0x7f0000000140)=@udp=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x1200, 0x0, @empty}, r1}}, 0x48) 19:20:59 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) [ 512.512723][T25886] hfsplus: gid requires an argument [ 512.518195][T25886] hfsplus: unable to parse mount options 19:20:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x3f00, 0x0, @empty}, r1}}, 0x48) [ 512.661393][T25900] hfsplus: gid requires an argument [ 512.680223][T25900] hfsplus: unable to parse mount options 19:20:59 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:59 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:20:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)="b8f9298b4ebd968fe7cefb6018cd9be98102de6223c8ab636402fece10a2d155ec07a454d576f0a42690453ed894e1e40d6f6bd68c92446e0f2f31d6843bf41b93ddea82a14deb036791cef08894952d58d05d4b6f377b7a6111729b7c8b7561a4c84ff2", &(0x7f0000000080)=@udp6=r1, 0x1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000001c0)="a7034c4d66285a20006e6c55f3dd26ce045a0ee7e61624d874654c2e12d0b09d5777a29c289bab4f67ed2905903dd9a905325d685ae9168801b71c9c24447003370c28ebc7f7184b56a05e7d5144e31fccece8a8a7554845e9e034bebdca96c7ea6adcf2bf61ab9a6f628c989a8d0342772963ba1ad6f9c47744d567f19d86a30c93c54213cbfca2cc0f46df98862708f11118e8b69fbebbc3379e5b91ca3cffb38f"}, 0x20) 19:20:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0x0, 0xb2, 0x2, 0x1fd6, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, 0xd0f8, 0x5, 0x400, 0x0, 0x1, 0x40010, r1}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) sendmsg$nl_route(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@ipv6_delroute={0x30, 0x19, 0x800, 0x70bd2d, 0x25dfdbfb, {0xa, 0x80, 0x10, 0x5, 0xff, 0x1, 0xff, 0x5, 0x500}, [@RTA_MULTIPATH={0xc, 0x9, {0x400, 0x1e, 0xc5, r1}}, @RTA_MARK={0x8, 0x10, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x30044820}, 0x4040018) r3 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r4, @ANYRES32=r4, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x300}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x5c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={@private2, @private0={0xfc, 0x0, '\x00', 0x1}, @private2, 0x100, 0x1f, 0xfff, 0x500, 0x3ff, 0x2120410, r4}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r2, &(0x7f0000000000)="607db27984825db94f83db17ab21585124677d91d8255aaae19594826506a38c129b9d9c7a9562d73f60d8aa0eae9794cdeb091a7a364f88dfe1b58835b3ef00cda375eb281bae3bb3345577426070a049977d57d7c12ea6a3ce49c4535d1b87c8bea49e12532cb616f8e9704cb78a021781fe1bf7a7ece691614d9389e26e01e32f81b7d2e8db3348af1c69cec0073b87fa50b6ef4f45eb84abc8aaf0b36bad0977f48cf8ca87c3825c427d92458c10b048a194aa4b521bd08519917649948c9da6c01a7e9c8e0293ef508673fa0a6c623a87a32cdd95b5e783078d5446d49f9c6bb8a9794882540be31b993cf30406b61cb44af03619b0", &(0x7f00000001c0)=""/178, 0x4}, 0x20) 19:20:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}}, 0x0) 19:20:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x80fe, 0x0, @empty}, r1}}, 0x48) 19:20:59 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) [ 512.927408][T25915] virtio-fs: tag <(null)> not found [ 512.935842][T25915] virtio-fs: tag <(null)> not found 19:20:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) 19:20:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xc0fe, 0x0, @empty}, r1}}, 0x48) 19:20:59 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:20:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/167, 0xa7}], 0x1, &(0x7f00000011c0)=""/4096, 0x1000}, 0x10022) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x4, 0x1}, 0x0, 0x0, &(0x7f00000004c0)={0x4, 0x5, 0x40, 0x9}, &(0x7f0000000500)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000010000e50009000000180000e00800000010000000000000"], &(0x7f0000000040)='syzkaller\x00', 0xfffffff4, 0x64, &(0x7f0000000080)=""/100, 0x41000, 0x3, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x2, 0xffffffff}, 0x10, r2}, 0x78) 19:20:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x1c, r2, 0x1, 0x0, 0x0, {0x2}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}}, 0x0) 19:20:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r1, 0x0, &(0x7f00000031c0)=""/102400}, 0x4) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYRESDEC=r3, @ANYRES32=r3, @ANYBLOB="b8a892c48de325aa76d088af28744b5fad714f8bffaec9531ea2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100766c616e000000001c0002800600010000030000040003800c0002001000000001000000080005005b71cf49d2e1e4771f0d84c20a51ae2058f8abf9d288a41bf0faa637eff0244110680b4b94b146f92131261c136e69e130776c8fde318fa1fe1192a407c7965065f05bb3", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x5c}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x9bfc, 0xfffffffd], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @ldst={0x2, 0x3, 0x3, 0xb, 0x1, 0x80, 0xffffffffffffffff}, @generic={0x2, 0x2, 0x3, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x2, '\x00', r3, 0xf, r0, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x9, 0x4, 0x200}, 0x10, 0x0, r7}, 0x78) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x6, 0x5, 0xfffffffd, 0x142, r1, 0x2, '\x00', 0x0, r8, 0x5, 0x5, 0x1}, 0x40) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000003c0)={0x4, 0x0, &(0x7f0000000380)=[r2]}, 0x1) [ 513.392884][T25948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.441281][T25948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 513.552413][T25955] virtio-fs: tag <(null)> not found 19:21:00 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:00 executing program 1: socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x0, 0x0, &(0x7f00000002c0)="1a00000002000000", 0x8) clock_gettime(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0x1a000, 0xfc, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 19:21:00 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000140), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x44, 0x0, &(0x7f00000005c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) ppoll(&(0x7f0000000180)=[{r0}, {r1, 0x20c}], 0x2, 0x0, 0x0, 0x0) 19:21:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xfc00, 0x0, @empty}, r1}}, 0x48) 19:21:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x1, 0x0}, 0x8) recvmmsg$unix(r1, &(0x7f0000005280)=[{{&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000600)=""/17, 0x11}, {&(0x7f0000000640)=""/141, 0x8d}, {&(0x7f0000000700)=""/198, 0xc6}, {&(0x7f0000000800)=""/3, 0x3}], 0x4, &(0x7f0000000880)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}}, {{&(0x7f0000000980), 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000a00)=""/172, 0xac}, {&(0x7f0000000ac0)=""/91, 0x5b}], 0x2, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000bc0)=""/227, 0xe3}, {&(0x7f0000000cc0)=""/178, 0xb2}, {&(0x7f0000000d80)=""/149, 0x95}], 0x3}}, {{&(0x7f0000000e80)=@abs, 0x6e, &(0x7f0000001100)=[{&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/244, 0xf4}, {&(0x7f0000001000)=""/202, 0xca}], 0x3, &(0x7f00000051c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}], 0x4, 0x102, &(0x7f0000001140)={0x0, 0x989680}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000005400)={0x1, 0x3, &(0x7f00000004c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x2, 0x1, 0x6, 0x1, 0x7, 0x0, 0x23f128e40204a1fc}], &(0x7f0000000500)='GPL\x00', 0xffff, 0xb, &(0x7f0000000540)=""/11, 0x41000, 0x18, '\x00', 0x0, 0x1e, r5, 0x8, &(0x7f0000005380)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000053c0)={0x5, 0x9, 0x8, 0xa359}, 0x10, 0xffffffffffffffff, r6}, 0x78) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r4, 0x89f9, &(0x7f0000005d00)={'ip6gre0\x00', &(0x7f0000005c80)={'ip6tnl0\x00', 0x0, 0x8c37ad4e17ae4d4a, 0x8, 0x3, 0x4, 0x20, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0xf880, 0x3, 0x7}}) pread64(r0, &(0x7f0000005500)=""/16, 0x10, 0x355) bpf$PROG_LOAD(0x5, &(0x7f0000005dc0)={0xa, 0x4, &(0x7f0000005480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x6}, [@generic={0xe6, 0x7, 0x7, 0x8, 0x7}]}, &(0x7f00000054c0)='GPL\x00', 0x9e3, 0x0, 0x0, 0x41100, 0x11, '\x00', r8, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000005d40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000005d80)={0x0, 0x0, 0x3, 0x3}, 0x10, 0xffffffffffffffff}, 0x78) openat2(r1, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x40, 0x0, 0x2}, 0x18) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) sendmmsg(r3, &(0x7f0000008500)=[{{&(0x7f0000005540)=@caif=@util={0x25, "fb79ce2fd93d47603ac587ad653a38e9"}, 0x80, &(0x7f00000059c0)=[{&(0x7f00000055c0)="4c2a69bd3ab88371926b9f2ca5d6a60393e386392815ca34729b230d25a6046fcd0c8b2713004e98", 0x28}, {&(0x7f0000005600)}, {&(0x7f0000005640)="ccf131675f017b9c245e80e74786fd06e0c5a0f527f9589eabbb098798a9cfd4f66c2120acca59eb1ff2a19b174771cabf3e374fa0f5687763d06701c5d5010b6fa98ebbecc88ef3f852a8fd8d9e79b1c1dbec4a8654a3ddf1e2db4e69cd475e859de13c583a26c0c18d81a780c2e9204da6677bdf15873bee20119e90e8196196fe0453956c0c3f", 0x88}, {&(0x7f0000005700)="df1e5584ca78ede03e500a6cd72880f6d37fb68efe81ec1085f59f97fa28dd0fd006bd5bab75417e7a3109cd0ae298f234696acc8a9735921a9a03de985c37d266acaba7df3ab7253cc259f396ed4940e703c4ea2486068e3957d7f858b077f901e285b62770d55915f0bbd237a0d25d4ae5846cf760f68e72a9e21797ee9db375b3b055fd3888763e44f76c7f65c96af32e7faa78bb4438c8c8d13318c2e072d65f5f04a4fb05400dd7a254cf13bceb78eab9adde23bb5be581ab358c20cf366a48eb6b0ae5c7be2ef18d9b7a02d6e37977e176857b2ca10cb00573e6346a82b9", 0xe1}, {&(0x7f0000005800)="41e5bdb6d50f23c17d70380ed0a5e381f45a8f1188ff00fa25c4a36be651121263dcab978c1696336549099d17b571ba9743ed15882d2f447ea388b1ddf573de", 0x40}, {&(0x7f0000005840)="eda59a20f0d8e8f72b5cda17b9a69e342c778acd199ca2059ad2060b69c156174d9cf6f7fbcded84abb2457fa2f8e7e9025cc7ec02fb093f3106ae57bb84ec8ae9411a7b0df078c0099e73b6127db5ad93acbd361e5b2e808f82cf065fb2e6f50d55157b9bd4dd4e06a8702c7f84d675cfd7790a7f19e4a00154fc7f7f32a1076ea2850289b78a554c12020536aaa78fe8c646ffb81e0386570f86105fb24df0c8e70c95ab84241cbc649fca7338fc172e1e2f6c2abfd883be2b0074e8574a1b21c90608a41ea23ef21b62ef1937ad06dd62a0690fe17011d3251717ad413291deb27e", 0xe3}, {&(0x7f0000005940)="f52ba531bc521e810d6a678354a58a2cb7f1072bb52e237c722f379bddd10c36617ed71aaa3cd1648eb52045e0c0e1b1656a9eac1ec338064d05b00c8c120908bcb3a42aba1f6c00c05b6be30902363ecfcf63c907c94a1ae6c828526733", 0x5e}], 0x7, &(0x7f0000005a40)=[{0xc8, 0x6, 0xfffffc00, "7535ce88910f5bcf6188be3427c5b58a4001f321b4f9ed9c91f7e7780fa859f414f70bafb5b254170bb93cfbb291316da06c6224870519e7a406382f40c5797e5b3a2f84572e97b92ca77f01a4d981183759f161d13d93f307bfa8dc6271c9242c9a22d8917014f4c7acc0735572159bec8f894376ecaaaaeda39b83e4e99a392166ff1414517a6694153ded14b405f439239d5c8abedfc5f5d1fc8e76605db4f4972d2c96ed1d275d0349cb985810f01f8d"}], 0xc8}}, {{&(0x7f0000005b40)=@l2={0x1f, 0x7510, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x7c00, 0x1}, 0x80, &(0x7f00000072c0)=[{&(0x7f0000005bc0)="8fa0b793965e8db00d8737cdac289af53ccd8349ab57e782793d6880486de6183bc2618e07fb505582acb267b42ddd08249b2d2a215ea2aaffd18a5e2cfae46b27147500", 0x44}, {&(0x7f0000005e40)="b293cf27e2078ef3ba04575de80f3515069f54c1017bb761fa32f610f3a23e58797e3469aaab942b355dd46c919021705b40876fd4fb3822cbe5aa37e25413ad610fa07366d981e4a044f3a5eeb5b63177ed64f90ae92880029c93799d228f4acf7d95b5d12f8b97736b29dc8eaa09256aec24f0acbc4b271756b0103ba426b45ab4be133ca9f56b11ce3f7843c1c57583f5093819b4e99035b7915f591a77e9c8c53bb0f810c1c66bf3f4", 0xab}, {&(0x7f0000005f00)="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", 0x1000}, {&(0x7f0000006f00)="6407f2dba0007a49b358effa18a971c40b5282a487ce610db8216cd6ac318ff5220c279769d0c60437bbda55453767fc72343a111f0ef0814e538b920eff217f554154e26eebea20b240fb97d9d8bff732ee3bf783662e27bad576cb0694e98b614da2233f414741ccea00ece9252698e9088c9b1f0506827cc7bb", 0x7b}, {&(0x7f0000006f80)="9bae65a0ae5a3d82e7e2134b4baa2209299ee209ecd6300b15ffabef25fe304f6656b01988c78302358702b45aa58289d2a4006c4ed2de431b9fd7187d7cc19c177e19adc594129044da7e2abd22176e7cbeb0c7e905673d0e8b99bbff5972e1fc151f4f2793557d9eb72a46ff393f435dbafba57de8a3dab2", 0x79}, {&(0x7f0000007000)="21defd140cd896d66f904eadf03744ab21a5a459c4a415bb633392452a33abb784ac7f96adee5ba3ab1eb7fde628a1a1affcccf0f0611614640328e687ce7b219848a2e02a3d646c3fdcacb5f50cd8a86aceded1dd5e332e48b7ebcc945085fdf671c7093f083214735941c58ad9e4831a1e0d8ae7acd6b278ae1043ebf9c1ee1bd2482b07c1f52ed66c32ecc71b023d4f8ac4ba458b78cfc7f9d8cfeca1f328fab82e76", 0xa4}, {&(0x7f00000070c0)="9e1987aac918f54830fdc2b1353c644f15973353c1e5e95dcbe5287ed3a919dd322047caba6b48a44f7e113a46043d635c5726571ec03cbdd38dff739531cc88580bf7a21ce7a7af088e95739957c250", 0x50}, {&(0x7f0000005c40)="be221856ee1275a1d139de13be83b0eb460d1580269182921bc3baa9f85e6511455696ac5284d37657a7fd6667bc3485c1c0d1a511f6664ca2", 0x39}, {&(0x7f0000007140)="e4bea060a4a348120cc2855921ce76868f5182615b541216ad67f6227da503e6b24a94eb5887581e71b50751003d4c42652509e9b8661648a975f80e1b38cd4a5bb4b8fa28a3d342fb5159c64f9d7f09b9fd49e17ed64823b59b43610aaf2879f62f3ff57b226e166e8ed05e89e6399accccb136e4c2ef9ee2eec0d491ee6d882e8b969ceed8f1d2cabefc04569ac19db2f138d7759b03b2d35db7cf4ea46c92216ace404cd13de80f60f3a48ad6f56ade11b695a93f01d387087eaf089c3413d5742f3b02b71b9396d406bee5daf007dbd9ca4e3bf4a91a0a48b8f82ba4ddde800c558f2e62aded99a30e432e33", 0xee}, {&(0x7f0000007240)="bef377a1893114d610a6eae4d466ad2d51c19bc2d04c6a60114fd82d9edef23d0c51f6de435b73580bfcc49c7e89712b0d39253c0ef40abacf46f437897d9abd21dbe29948bf9cca925bababc4e262fdc9599b2fe299c1", 0x57}], 0xa, &(0x7f0000007380)=[{0xe0, 0x116, 0x1ff, "74e4aa4e26b73ffe951e1d0171c705a5c4454ee4e64234ec8ce6360cebaa702e47bfd95daf2f67456cc915849d027913759cd86088ddd0f6a09da1e5d86278b1d656e4dc0a8e3e4797502aa0491b6194c5a0ef3000fa556661c1f8d7012c14ec40255febb85ed0616d3aa50a8f6495e1f5fc82c1ad265edc85b2eefcd9051aac64c49497b8f4213f3f1c730d1d0f20dd07e5f07136cbd4bdbb11a15320499aaa513c17b549893370a531aee44b9662c6eee86410198015a0ee06394864b7aa77fb73eea6c37185602ef508"}, {0x1010, 0x0, 0x7fff, "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"}, {0x88, 0x21f, 0x2, "e97ad27f6d7656c63762fe6d555e922b2278f00a47936540b1bfa803fce6b0cc3dcc0a8d4ecbeab97862395fef5872307bbed1dd4b728f54458320282432ed9cf764e1a473a36c2dcb67ee2efd9ae78d7f74ec51b0f4ab5f4a46ca9ef53aac06694601655817caa06443018527167db8b519d6fc"}], 0x1178}}], 0x2, 0x84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000086c0)={0x11, 0x5, &(0x7f0000005600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x2, 0x3, 0x2, 0xb, 0x10}, @generic={0x0, 0xf, 0x7, 0x9, 0x1}]}, &(0x7f0000008580)='syzkaller\x00', 0x73, 0x74, &(0x7f00000085c0)=""/116, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000008640)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000008680)={0x4, 0xb, 0x1, 0x1739de56}, 0x10}, 0x78) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f00000011c0)={0x0, 0x0, "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", "e73eab27dfd0fabdeec86fb9bc2e760ec3b846c9d56cea277821d310e25a7838c345330e6b7e087480c14f0183bf14289deabc2f683a94f73267f780ffdf6bbc8367904f09d6195a4d53a2cb1482043d6d09667d9d9e4d212804d329ec85f03c77c885eca0623ee99e4796ba5181f682d9c31e430fe9c9a097c89390cfea4ef6d3b77cf2d262fc8c066f469b6c7b5370058223b2e6026993e9d66a9489e3519c56cff58d74779fbe1cce65b86d4efba4ff03027e1313237052303737d80636f92320dd1e83335874d8fd78313b006f737ec3df108164ebcf52df560a917a7374bb5c861ef0278dafbf0c0c4c3ba59224bdaaff28f2e5dc1b5497563593cf6e7373637604f2741d5c38c27a495aef45a4a4eb37cab12cf780b4c4b39ffe824a9111e41d95f5a07a24bacd52f0ff84525a5926f38481f47b9a825b70bb97cbd5f22fd37813fedfd19ac8ffcb4e5f4990610e609e21262b7be69f6d0e6efff7caf2c4c1769852825d69c0a65f51a0e87bbcdd0e5d28e52aa0d616b99efdee77a2c9c499387915b20134745de50132e3f591f074fa57323c102644318570959c300ba5c2024831128d310f297fa1d6a151c52e5240e0a31a29c859786647b0aab4c71c8d25ca6554626054018c5ab5fc34a168f5844d8a7a432b707c17161f9b041949f6f4332d15952ed6e077816a16a78d1035078ca091cc60d7da8aa7e92ba889cbc609926af058f802ef30a6202aa4edec779fbae26453f90a03429200f39c0e1e89feae83e2fc8b3f1016fc1909ea18251c9c827ff3b298749ba8948a8dca42ce08b2b5a9a6092ef264f2098601f1ee26e20261bc22763ee9cf32197f36c177a0b9887ef120e969ae0e26cb9c75068daa0b8a4b053da9d58a94b642ab18203f01101dc9a7ee9e209765ba22bc02a040b481c9a1b4a9a9339c6bdde5e19d9f79f981c3032d4b975e7ae6fd9af29ad99e150c3f9fe77f33b536e2526c26c7ddc88db33fe142e103c70fef32b7c9a62c8d8b3ad134b42ef5f928e7925c4503f20858e4e857af8606499bb6188491720c0a9b6ca9db3596a87e0441740165bcb3fe5d05c37b033f50e82f3d92f7f6e4cfa78dcd451da68d61ab283a2608ad5624c70dca9523ed3ad92bf783347e9270661ad1fd9a80136fb24f6b951ba7768c7ea575ac3a8ca90ca271a580e8e4391db187edcd30a59b86c25dc5499986d8f47564519ce6f4d6d97fae0163198d09c4da6563d78339abe9a09d2d62ad254de6071871c7a17feb7f6164a3dc84b5c7fe737a66f5959fbd2289207c082152ed92f4cf142d95c8808644723367ba3c2e71ffaed997a2ea2fa93137cb8855fc91bc8c9e608ba4922144e8f45b9633f254a284bbd7eadb250be3b81980aeec202f6c70f126c4b3e6e7b56269560ee9c43f3b95e37c523b1a93c0ad4a7b2126ae21c27eb1cc9db5daedc2c8b7a784e24ba2b781e1509de566952c08a960958542a2aaacec35b398aa7108eeb5adb594db04e1f78cbd9217209d306649a80f9953199789af11c630c795a89d882fe31785be1e1a8edb7c38db1d756d7a4b2f28d210e2a67d4ef6609b96f47fc44df5efbab07de262dcf157c85929d289b244f61980a5d2f9ee6186071ca875dfad435ec72f37ff2d340d4920739d18d6004b710e439141418318aa3f45c6517c856f11a754de801bb1168f51ebf7c42d4166813973efe89f676216940a1812e046f253f172974936aaead7aacfcb1a728811d8df0b75e186cbf4b38213aa03507e3bd0a923cfac2472f065689091e9fed534f3ca62dfb48e64405669652b1e273179bb1948fb6194bd0c3d9c5a2177ff9afaf009127f7f0e94907e284898f41899934c4ee8cf37372607e74cd96602169d4012dadff7ea5070a5e9c7a6a37a0200c0932bc625a1251cbaa1655e3e26a2c9a4e47d41711c78949ef83b1a6d5d9cb7dd271fb6e08a344a94140728f7a0a8ff74fe9c10d545f02c721445033255c90ce7c28989e7c0a4f788e19976cef7e075c9ebd554addd75d96f99f32d150fbd56e830ab2bf5192e0fb4be46c5072417c51ff5ea9cca43d2b8970b652a6aa5c5915af38bfe4e554c77eb9bc17dabb54042f317a1d879afbbfe4b6ac229312fbd4f0cc79fde7ef0477b619371a59ccb7f589f8ebe3c189ec15108b8e5eed5031c668f71223b618d8e25062a85129762e9af86754dd5d599c220629f5fe04215d395ceec45ab973a56f870b58a0b00b174c686b37cbb58c15efcdaedcf023bd059258605511574da66a3acc07d8754eef624266eb5ee45d76ec3d2958e2827f5ce26acef8734c2536d1579058e682317be323d20cac962ccc0e7e33f850f16ad4d5d9350037e086102824492b176697cfdd9a63adc201397d16a27507741135727c38c4eaaf36f3cb9f2114ab7699a905bed7fbb408dd2726825704f543b44cc710cb4d9a6677f2c20c30f60648ffdf3580a88747430d14844aefdf2b869f28b6383a1bb47d8d8a7e3c9476cdd6042082f09c01b0b311fc0736026a0d937f71950ef6a47e39cbc3350d7e059a3dcb3024582e7c9e4122400f5f03c9a349d2478a8dc0378e8e41f0b44acf70d6f2afbb59de56eaef7ba8d1d064bacf3c9350f5130b0972fd74b687d344e61427e60eb39a58d19516731c9023fa6f91526a8a57b206fdf40b7b050d9957b006eefb0a02690c817b50207b4d0e7fd94a24d265c3bb0517e8c089a019af2c7cf2f18ec112d4a8e706e2ffa6859d2a86b0b3955f06c7cbe6cd10102c238b48b0c8dafb568b621cba8098f1b10e7d057ea4d6425c7374738149e71201806bdfd3977774bdbeccbe50b51ea7bac6f5992d8546397e5c7003fcc11fd5bf1763fcd8f96688761d3012c6f770ff4b64d8052633b99f370005f18396c46004b4ed0271e6c66e15c0ede6fe454e4ade08febe8e246840d827994a07672c733687078e08cfd18e05365ba9cf4a4506293db0a9017ba37a15ab804aaac0e8c76aad59867de1d9965008ea9d03e556befea29ce3c074731536308a035fe3b8cc9be572845d17e27be0b8f2ba7e52c168c4a12f9f71a604f31c573bc5fb55d6199420ac958b21fad4ed8d1013605fb47615b6096ccb59e3253bc6b52d193c283a4d5cffc7e69e9938d43e790a32d22c046d930fc86209bb6d6aa36ddcdba2f3d526e7dfc4a5c78b5883c85698558df68d3ecd8eda03cbf878ef9294a5f350ecff3dcaff19d2589cacd13e2a0a67aa93211f3c3e0671d07d87cdf88968d7b1a6b7e317040919c1aa43483cbedded37afa1973b474417673a7aaadcd1b92498abb63d90053fb4846d68201db831c14eaa3997bac1e75d344670b6cb7e85c573b7d280977a452fcf51b79a98ac1c5c5b840ac371e36be08b855907f517d131822f228223a00af96aa24e456a98a88fee34eb1cab34864e0061c4c36b36c2e1fcd1136988ebff004898a4be663582b0dac17efb64856764c7b54bc9f09819966dc46afdf8faff70f34fe1d8d62f86b23fbf34ca71476f5948f923908635770e3e4d210206eabfcf50f4b56fd3bfff483bd36f222567a91ecaa9f12c3edd7e8116179696edfa0bdd055ab99bb44b7bbcd6508384caf575da95fdfbb398fa00d787babf449a74eedf4cdbc403200533f970a357b6602c72bde013f6b6bcb03027c449a122031b2aeb9eebf839779b326e4330567d232932b4facddbb4a011a502d1246950fbb79ae0c3cccc8de6de358d36730347689ca078d95e98b7908a2fb310cb88cfb0846542b6e99b19e5dc16268fccfd2b80e23e2f61bb8a65dea4901fac617b6224294d462f8e66fb1f15060d3702fa411a21fd7aa3b2ae503eb0e05399923c2c44fb03594e5e1544b49dac0eed2cc31d8aecbb63e408762252e97f7a7b0c4b1a4cf5a4774bb4d9dc9340b3c9df9711c221966c65c454111c9ba9ab451e55678fcecaf2db09af878e3c523dce358c3d4ca04ac565b02a968040e154b7d5109de08482dc1463cec22a3c932cd2f38c28425452d6f88aba467770fce0e6ed55da4f9634d24a494897cf1d4505ce1e41887eb0dd2ee6d407db8ace2d9e934b427e216c4d0b8b51a79f09deba894f960233958f02297b5e4b8ab5075fb5f723fe661a4b61b672232ca6d5666e676752b262c406f49bdc8d319477fb9f00aec235fa8d30c096c29cc9dba81e1075eec9e5f936241b76719c90453279a4da89b5098381cb6f41bccc5b5d36fc5b0d3bd79455be1fa0eb9ede97560a6c95df2e2e1fbee6cd95d61616325de0bb0b696dbf5618e65ed343a4d9108835135632a0aae2f09abe20a6b4fe790287522e5a76169d40dc15362fba804569781655e8ab92907a36479fcbb8a5a2036cafd7a3946709eb0f27e3ec150d976f586fa3a16b20248e2f3d142227fd401a1a2770452cba5c780fb74f439cf43a64d69c9bc61be5b4e87678bcba34319da39fc649da74e3dec73916e21791794d5b3803ef82010a4546de0a7dd17647225ebaca3b4926aa8bb4c646ce1fa69629d35385a6963bb103e465df21d03ab8756b1c032dfd43ef28b32db663758180787e8bc9c31357132346f4edbefc3a3e691e2c10af32110cb850fc2e6bd82b1b6512edb11c1e2e076064164274f3928869b13bd672bc5eeb2b3b3fd8fbb537c1a0983c955b1b15cf2ab83d1f9c297333401ba74a195369a395341accab9b5a779cd941383281e41852c995d7288f6e08a59a2e15b264d5c855ae0512f303bfc11bc456462f421e90b2143804cc6b27d9e763f299136d70f231e6bfc5a979f67c1e5cb5b3d2b5637221dc46caba1a5d4c7bb89128da59fb9822f198c13e226a6ed81de4712af1af8571bf4bcbf2f68b604b7787db20c2858d22979b30e1766c208d99dfb7ab12368c74db4afb191858ef2de8f0989b64b48d3982a542fe18b43294003949a1b148865d4a2f6ab1eed7392f824d364302a95956c8c5f7173a5a85c91e157bc696660f62d29c6dd4de0b47b23a795c287360e06a346b0aee4180d41cd1accae7217e94e5a86c006fbe5201ad48b64d0b49d4fbc860ec48860dc6037872855c24a318733726ff7a1e6867b5c4d3c59c457e69887e00d946b2b75e055ea006b3e4d092e5874c6b9af91919e22efc8f61bf8d0174a9a8630b48713438622c7748cbc41853f2dca4d06c5e787f8e95aee40e58cbf0c30df17cfa74aa92b5f3def71175fc9c125939388cf6c81c6234cdbc14bf68b96080e73fa8180412cf93d73b7c8bf2aa1b51c4bf530963ac4aa7b14ffcd7dc82f474928a4eb60c935404858c5ea75a6975bffb61fd225a41d623c6731416a5175d966111824368248457863cc8441cfea024d343d88d717cd473e850b4fd30e1c439196a8d7b64252b05b01ff2542474c4c0039ceb1"}) ioctl$BTRFS_IOC_INO_LOOKUP(r9, 0xd0009412, &(0x7f00000031c0)={r10, 0x80000000}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x12, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b1db0000f0ffffff8500000d5b75b57f0083fd0000509c3fb64b614ea1641a47ef7a02f920cb65bbe8b8dad1fa642b6eee329d824c97ae3f32f869538ef21338c2a3b1adeebc6b6062f89577ba8b796722b7f63fe4fd53fb36a3094e494251c38b7438a0552b4227a113cc2c04f91e894c2785f6d5"], &(0x7f0000000080)='syzkaller\x00', 0x8000, 0x99, &(0x7f00000001c0)=""/153, 0x41000, 0x19, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xc, 0x1ff, 0x7fff}, 0x10, r2, r7}, 0x78) 19:21:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x50}}, 0x0) 19:21:00 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xfe80, 0x0, @empty}, r1}}, 0x48) 19:21:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x0, 0x0, &(0x7f00000002c0)="1a00000002000000", 0x8) clock_gettime(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0x1a000, 0xfc, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 19:21:00 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001200)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFALIASn={0x4}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x34}, 0x1, 0x0, 0x0, 0x8001}, 0x0) r5 = fcntl$dupfd(r0, 0x406, r0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x6, &(0x7f0000000000)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, r0}, @jmp={0x5, 0x1, 0xb, 0x4, 0x6, 0xa}, @alu={0x4, 0x0, 0x8, 0x1, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff}, @ldst={0x1, 0x3, 0x1, 0x5, 0x6, 0xffffffffffffffe0, 0x8}, @ldst={0x3, 0x2, 0x6, 0x6, 0x6, 0x50, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0xff3f, 0x0, 0x0, 0x41100, 0x18, '\x00', r4, 0x1, r5, 0x8, &(0x7f0000000080)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0x4, 0xfff, 0x371}, 0x10}, 0x78) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYRESHEX=r3], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000200)=""/4088, 0x0, 0x2, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffdf3) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000001340)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001300)={&(0x7f0000001280)={0x48, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xc}}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xa}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x100}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) preadv(r7, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/46, 0x2e}], 0x1, 0xffff, 0x7ff) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r8, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000240)={r8, 0x0, &(0x7f00000031c0)=""/4105}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) [ 514.239525][T25990] virtio-fs: tag <(null)> not found 19:21:00 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xfec0, 0x0, @empty}, r1}}, 0x48) 19:21:00 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x50}}, 0x0) 19:21:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x24}}, 0x0) 19:21:00 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r0, 0x0, &(0x7f00000021c0)=""/4089}, 0x20) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x20, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x2}, 0x0, 0x0, &(0x7f0000000380)={0x2, 0x5, 0x400, 0x3}, &(0x7f00000003c0)=0x19f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff33a70e4dc4193cac18e78551e6ae5dc926959b167fc09e23ec3679d818a05d29fe4df3f31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb58b070440dcff74c4c00b0e13212a55db69f2a6bdc6f9baf4ca444f46ac0af3f519cb8ce0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b2a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1dee58e7ef72e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a0142d3a0cfbef22b1a264c62328e5f93aa752b9780f51b079312eec1c06917a4b9aba"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x857, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0xd, 0x5, 0x2, 0x4, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1000, 0xf1, &(0x7f00000001c0)=""/241, 0x41100, 0x10, '\x00', 0x0, 0x21, r1, 0x8, &(0x7f0000000140)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xf, 0x1, 0x10001}, 0x10, r2, r3}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0xe2, 0x3, 0x1001, r1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x40) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000180)={r0, 0x0, &(0x7f0000033740)=""/102399}, 0x20) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x19, 0x5, 0x7024eeee, 0x1ff, 0xa9d, r4, 0x3, '\x00', 0x0, r1, 0x4, 0x0, 0x5}, 0x40) 19:21:01 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x0, 0x6}) socket(0xa, 0x1, 0x0) 19:21:01 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b4a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:21:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0xff00, 0x0, @empty}, r1}}, 0x48) 19:21:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0xfef4, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) 19:21:01 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:01 executing program 4: mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:01 executing program 5: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@index_off}, {@upperdir={'upperdir', 0x3d, './bus'}}, {@nfs_export_on}, {@metacopy_on}]}) 19:21:01 executing program 3: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x2000000}]) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) r3 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) fsmount(r2, 0x0, 0x0) io_submit(0x0, 0x4, &(0x7f0000002300)=[0x0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x1, 0x4a, 0xffffffffffffffff, &(0x7f0000001080)="cc07ef18ea4ded87578e6c2db6546feaabc6724be6c84df2191baf2785e1ba76eae9d6bec482091c5fb404afad9ab8b465be9427ca4747d7f42fad4e9ca95e2f6fd620dc727237792f7e8434bb5202bdaf9fb805650991f50d922cedff9579dfa82b06831bb9b456548aa9401521c7b33178286183228f10f232f092c6b28cd314a97f3a13851a992da63847a282426b13a9c4dd6a7cf0348a6469632618e1be89ab78", 0xa3, 0x0, 0x0, 0x2}, 0x0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f00000021c0)="d74d54a17200a818c5429223865cffa77a85da94301f75166cb5a1c161f45393b4ac88e5a9f31ac3907679cbe915f4ec2ac80adac3b5033904132cac3bdb85f9b8074b339704e4cb890a6628bc43f26f2fd3584be743155276582311ccf49f2b9251cd3e89abb8aa7f74c39ab8fd0527c4beba90298e2a779fd9e9a6cea492ec1c5ee3906aca635d2b9ecba5a1a1c727bc9ce766879d9f85cc23674bcb5327a5f7abde0a7aa85d0b719253b6d25aa5170c11ef2fd1060b8b0bcf9c", 0xbb, 0x1, 0x0, 0x1}]) r4 = dup(r3) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0xfffffd2c) write(r2, &(0x7f0000000d00)="81310270176b8ae5e8d134a4f196cfcce91cde3cb093dc2ebb9bac209c6debdb5bb23a9e73e4c6183a3460c98f4bfe46256f26f804f4a34c0a27f102c91f62120330332142e5d8f9abb266bcfe24e5fd0b889eb5a1ce57f1b66238a3522401a4b208b3b3460a22d737", 0x69) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x4052, 0xffffffffffffffff, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x10) 19:21:01 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) [ 514.968404][T26030] virtio-fs: tag <(null)> not found 19:21:01 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000000c0)={0x1b, 0x7, 0x0, {0x12, '/dev/loop-control\x00'}}, 0x1b) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) [ 515.111355][T26037] overlayfs: conflicting options: nfs_export=on,index=off 19:21:01 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f00000002c0)='$W@\x00'], 0x400) 19:21:01 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:01 executing program 5: socket(0x2, 0x0, 0xffff7fff) 19:21:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2, @empty}, r1}}, 0x48) 19:21:01 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) utimensat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) 19:21:01 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:02 executing program 4: mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:02 executing program 5: ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000440)={0x0, 0x2}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000400)=[&(0x7f0000000140)='\x00', &(0x7f0000000240)='%\x00', &(0x7f0000000280)='#*^@[\\,\x00', &(0x7f00000002c0)='%{$%\x00', &(0x7f0000000300)='\x00', &(0x7f00000004c0)='+{!-y&\x84\xda\x1fr\xfb\xf6hY\xa0\xec\xad\\\x14\x03\xf5M\xd2\xef\xa4\x94*\x9d\xdf\x80\x84Z\xae\xa9dj\xc2\xde\xbf\xca2\xc0;\xe50\xc3\xbc\xcc\x1a\xa2\x13$\xe2\x83\xddl\xfa\xca\xdb\xd0\x1ci\xeaWx\xa6<\xd1\xcay\xa8\xdaHB\xf2;\xef\xb3\xe3\xc9\x88\xe7\x19g\xd0P\x1c0\xcfC\xc9-D\xc8\xb8\x89qJ\xb2\xb6\xe4\xf7Xo\xc3\x06\xea\xe1\xf2X\x84\rK\xb8\xf3\xd3\x93[\"\x88\xc9\xa7\xc43\x96\xad\xf7\xa5\x9b\xad\x1e\xa1\";\xdd\xff\x96=\xfc\x8b<~\xdc', &(0x7f0000000380)='@\\\x9c\xc5\x00', &(0x7f00000003c0)='$\x00'], 0x0) 19:21:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x4, @empty}, r1}}, 0x48) 19:21:02 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:02 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x80002160) 19:21:02 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:02 executing program 3: accept4$x25(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:21:02 executing program 5: syz_open_dev$I2C(&(0x7f0000000000), 0x0, 0x0) 19:21:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x6, @empty}, r1}}, 0x48) 19:21:02 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:02 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="0421000012"], 0x2104}}, 0x0) 19:21:02 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x1]}, 0x8}) 19:21:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x7, @empty}, r1}}, 0x48) 19:21:02 executing program 4: mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:02 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000), 0x84000) 19:21:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 19:21:02 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:02 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001680), 0x646080, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(r0, 0xc01064c1, 0x0) 19:21:02 executing program 0: r0 = socket(0xa, 0x3, 0x3b) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) 19:21:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xc, @empty}, r1}}, 0x48) 19:21:02 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:02 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), r0) 19:21:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[], 0x24}}, 0x0) 19:21:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x12, @empty}, r1}}, 0x48) 19:21:03 executing program 0: syz_mount_image$zonefs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="9d21ac316565849f20cb02f110d19cfb047b3d911350532abff6d123acfd175f9e687d4f5a564ff38b8c2ef81d415e8cd9e1906f2b94eb3f891636d114d03bc82e5476bd2e53128406196443239e2fbbfb9faadba8be51bc1fca788930d44505f35110cf9e4122"]) 19:21:03 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:03 executing program 3: timerfd_create(0xe, 0x0) 19:21:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 19:21:03 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfc, @empty}, r1}}, 0x48) 19:21:03 executing program 0: add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c7", 0x1, 0xfffffffffffffffc) 19:21:03 executing program 5: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) socketpair(0x8, 0x0, 0x0, &(0x7f0000000280)) 19:21:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x600, @empty}, r1}}, 0x48) 19:21:03 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc1}, &(0x7f00000000c0)={0x0, "95afcdd26b40d44c3dabb7b85ef6e7f77c35a7b3738d7eb918dca3e3841987ed7c6f128ab50e7bcece633016577ee292434ef2bf2ae76c6dec989ea442e8b518"}, 0x48, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x0) 19:21:03 executing program 0: r0 = socket(0x2, 0x3, 0x7) recvmsg$can_bcm(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40000023) 19:21:03 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x700, @empty}, r1}}, 0x48) 19:21:04 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:04 executing program 5: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r2, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:04 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x4000000, 0x0, 0x0) 19:21:04 executing program 3: clock_nanosleep(0x7, 0x1, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 19:21:04 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xc00, @empty}, r1}}, 0x48) 19:21:04 executing program 0: syz_mount_image$zonefs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8d2026, &(0x7f0000000380)=ANY=[]) 19:21:04 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x1200, @empty}, r1}}, 0x48) 19:21:04 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000680), 0x22a00, 0x0) 19:21:04 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}, 0x0) 19:21:04 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:04 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r1, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:04 executing program 3: symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./file0\x00') 19:21:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f00, @empty}, r1}}, 0x48) 19:21:04 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x80fe, @empty}, r1}}, 0x48) 19:21:04 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 19:21:04 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000540), 0x4) 19:21:04 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 19:21:04 executing program 0: faccessat2(0xffffffffffffffff, 0x0, 0x48, 0x0) 19:21:05 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) 19:21:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xc0fe, @empty}, r1}}, 0x48) 19:21:05 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r2, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:05 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, 0x0, 0x0) 19:21:05 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 19:21:05 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:05 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, 0x0, 0x0) 19:21:05 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="0421000012", @ANYRES32=0x0, @ANYBLOB], 0x2104}}, 0x0) 19:21:05 executing program 5: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) 19:21:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfc00, @empty}, r1}}, 0x48) 19:21:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd1, &(0x7f0000000340)="c4ca9107780df864342f5fb069a0e1167d0561526b7b049ef7a22899f37ba79cdc792bfbd41b0658be8de5700000000000000000000000000090184dd8430d0ed18bfdaef8476eac66a6d2d51c1e12a1b7364c285ff18c3d459257890edcad78e822543424535f7ef5e28fb84ea6e363600f7ec4dbcd0d485b8972f545365435aea80749af4b657364ed68a905495c03dd6ebe2f936f18cf6198bdffad0ce9ff66e23287b3770836dfca046064525f525e6e516bf55196d15a0d4b70cee12beb0a72980fc2a76ef49f5bda71cdacdd38d4"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:21:05 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) 19:21:05 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/231) 19:21:05 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, 0x0, 0x0) 19:21:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfe80, @empty}, r1}}, 0x48) 19:21:05 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:21:05 executing program 5: bind$can_j1939(0xffffffffffffffff, 0x0, 0x0) 19:21:05 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:05 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000c00), 0x8) 19:21:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfec0, @empty}, r1}}, 0x48) 19:21:05 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) 19:21:05 executing program 5: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:08 executing program 3: r0 = socket(0x2, 0x3, 0x7) recvmsg$can_bcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) 19:21:08 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000100)='blacklist\x00', 0x0, 0x0) 19:21:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xff00, @empty}, r1}}, 0x48) 19:21:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000024c0)={'ip6gre0\x00', &(0x7f0000002440)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @loopback, 0x0, 0x7800}}) 19:21:08 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='virtiofs\x00', 0x0, 0x0) 19:21:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x5) 19:21:08 executing program 5: pipe2$9p(&(0x7f0000001e00), 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 19:21:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x40000, @empty}, r1}}, 0x48) 19:21:08 executing program 1: r0 = socket(0x2, 0x3, 0x7) getpeername(r0, 0x0, 0x0) 19:21:08 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14}, 0x14) 19:21:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) 19:21:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x1000000, @empty}, r1}}, 0x48) 19:21:08 executing program 1: r0 = socket(0x2, 0x3, 0x7) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:08 executing program 5: syz_mount_image$zonefs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x22000, &(0x7f0000002580)) 19:21:08 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x4c001, 0x0) 19:21:09 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0) 19:21:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2000000, @empty}, r1}}, 0x48) 19:21:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x48015) 19:21:09 executing program 1: openat$incfs(0xffffffffffffffff, 0x0, 0x4829455ed58b71e5, 0x0) 19:21:09 executing program 5: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000), 0x10, 0x0}, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x20) 19:21:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @isdn, @l2tp={0x2, 0x0, @loopback}, @can}) 19:21:09 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x86000, 0x0) 19:21:09 executing program 3: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "f8caf27e7f4e5ddb11028a42c672f001b9ad5b487c1d32b5cd20f2ec81c80d95346e2deb4cdd217fde060fe7e879e16ffca4fdf52340c867c9583511b56ba215"}, 0x48, 0xfffffffffffffffc) 19:21:09 executing program 1: syz_mount_image$zonefs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 19:21:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x6000000, @empty}, r1}}, 0x48) 19:21:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000004c0)) 19:21:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, @hci, @vsock={0x28, 0x0, 0x0, @local}}) 19:21:09 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0) 19:21:09 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="0421", @ANYRES32=0x0, @ANYBLOB], 0x2104}, 0x1, 0x0, 0x0, 0x40480c0}, 0x80) 19:21:09 executing program 0: getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 19:21:09 executing program 5: syz_io_uring_setup(0x79ec, &(0x7f0000000040)={0x0, 0xdedf, 0x8, 0x0, 0x1d}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 19:21:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x7000000, @empty}, r1}}, 0x48) 19:21:09 executing program 3: socketpair(0xa, 0x0, 0x0, &(0x7f0000000440)) 19:21:09 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) 19:21:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, 0x0, 0xfffffd28) 19:21:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xc000000, @empty}, r1}}, 0x48) 19:21:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000540)={'\x00', 0x0, 0x7fff}) 19:21:09 executing program 1: pselect6(0x40, &(0x7f0000001600), 0x0, &(0x7f0000001680)={0x7ff}, 0x0, &(0x7f0000001740)={&(0x7f0000001700), 0x8}) 19:21:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x12000000, @empty}, r1}}, 0x48) 19:21:10 executing program 4: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0) 19:21:10 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x700}, 0x0) 19:21:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, 0x0, 0x0) 19:21:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000001c0)={0x0}) 19:21:10 executing program 1: r0 = socket(0x2, 0x3, 0x7) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @null, @netrom={'nr', 0x0}, 0x0, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 19:21:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x3f000000, @empty}, r1}}, 0x48) 19:21:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @nl=@unspec, @hci, @generic={0x0, "62ee1f561b21cb30000d37b8d5fc"}}) 19:21:10 executing program 1: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r1, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:10 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) 19:21:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfc000000, @empty}, r1}}, 0x48) 19:21:10 executing program 3: socket(0x2, 0x0, 0x63f9) 19:21:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) 19:21:10 executing program 1: getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 19:21:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfe800000, @empty}, r1}}, 0x48) 19:21:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 19:21:10 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 19:21:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) 19:21:10 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2}, 0x8) ftruncate(r2, 0x200002) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 19:21:10 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2400, 0x1) 19:21:10 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 19:21:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xfec00000, @empty}, r1}}, 0x48) 19:21:10 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x79ec, &(0x7f0000000040)={0x0, 0xdedf, 0x8, 0x3, 0x1d}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 19:21:10 executing program 0: pselect6(0x40, &(0x7f0000001600), &(0x7f0000001640), 0x0, 0x0, 0x0) 19:21:10 executing program 5: timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) 19:21:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0xff000000, @empty}, r1}}, 0x48) 19:21:11 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000001840)={0x0, 0x0}) 19:21:11 executing program 4: timerfd_create(0x0, 0x180800) 19:21:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000002dc0), 0xffffffffffffffff) 19:21:11 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x0, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 19:21:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:11 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000001840)={0x0, 0x0}) 19:21:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x2}, r1}}, 0x48) 19:21:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000c00)=0xfffffffffffff69b, 0x8) 19:21:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) 19:21:11 executing program 0: syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) 19:21:11 executing program 3: r0 = socket(0x2, 0x3, 0x7) accept4$packet(r0, 0x0, 0x0, 0x0) 19:21:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) utimensat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0), 0x0) 19:21:11 executing program 1: socketpair(0x22, 0x0, 0x1000, &(0x7f0000000140)) 19:21:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x4}, r1}}, 0x48) 19:21:11 executing program 4: unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x1) 19:21:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) 19:21:11 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 19:21:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x6}, r1}}, 0x48) 19:21:12 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 19:21:12 executing program 0: syz_mount_image$zonefs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x1, &(0x7f0000000200)=ANY=[]) 19:21:12 executing program 1: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) 19:21:12 executing program 3: syz_io_uring_setup(0x4368, &(0x7f00000015c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001640), &(0x7f0000001680)) 19:21:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x7}, r1}}, 0x48) 19:21:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) [ 525.594996][T26585] zonefs (loop0) ERROR: Not a zoned block device 19:21:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x40) 19:21:12 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) 19:21:12 executing program 4: pselect6(0x40, &(0x7f0000001600), 0x0, 0x0, 0x0, 0x0) 19:21:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) 19:21:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xc}, r1}}, 0x48) 19:21:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[], 0x24}}, 0x0) 19:21:12 executing program 1: r0 = socket(0x2, 0x3, 0x7) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 19:21:12 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r2, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) recvmsg$unix(0xffffffffffffffff, 0x0, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x12}, r1}}, 0x48) 19:21:12 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={0x0}) 19:21:12 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x590843, 0x0) 19:21:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001180)={'syztnl2\x00', 0x0}) 19:21:12 executing program 1: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x3}, &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x1]}, 0x8}) 19:21:12 executing program 0: syz_mount_image$zonefs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100a, &(0x7f0000000400)) 19:21:13 executing program 4: io_uring_setup(0x0, &(0x7f0000000080)) 19:21:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfc}, r1}}, 0x48) 19:21:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000002dc0), 0xffffffffffffffff) 19:21:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={0x0}}, 0x0) 19:21:13 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, 0x0, 0x0) syz_io_uring_setup(0x4368, &(0x7f00000015c0)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001640), &(0x7f0000001680)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 19:21:13 executing program 0: pipe2$9p(&(0x7f0000001e00), 0x0) 19:21:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x600}, r1}}, 0x48) 19:21:14 executing program 1: clock_nanosleep(0x7, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000180)) 19:21:14 executing program 0: syz_io_uring_setup(0x1ae3, &(0x7f0000000000)={0x0, 0xd684, 0x8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 19:21:14 executing program 5: pselect6(0x40, &(0x7f00000000c0)={0x8}, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x1]}, 0x8}) 19:21:14 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 19:21:14 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 19:21:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000005b00)={'sit0\x00', 0x0}) 19:21:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x700}, r1}}, 0x48) 19:21:14 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 19:21:14 executing program 3: r0 = socket(0x2, 0x3, 0x7) ioctl$SIOCRSSCAUSE(r0, 0x89e1, 0x0) 19:21:14 executing program 5: syz_emit_ethernet(0x3c, &(0x7f0000000000)={@random="e19c9709dfbe", @random="00000600", @val, {@ipv4}}, 0x0) 19:21:14 executing program 1: add_key(&(0x7f0000000300)='big_key\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 19:21:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 19:21:14 executing program 3: pselect6(0x0, 0x0, &(0x7f0000001640), 0x0, 0x0, 0x0) 19:21:14 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, 0x0) 19:21:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xc00}, r1}}, 0x48) 19:21:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) 19:21:14 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000000)=[{}, {}], 0x40) 19:21:14 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) 19:21:14 executing program 0: syz_mount_image$zonefs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x2000, &(0x7f0000001380)) 19:21:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x1200}, r1}}, 0x48) 19:21:14 executing program 5: unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x1) faccessat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200) 19:21:15 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000240)) 19:21:15 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x0) 19:21:15 executing program 3: r0 = socket(0xa, 0x3, 0x3b) bind$isdn(r0, &(0x7f0000000000), 0x6) 19:21:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x3f00}, r1}}, 0x48) 19:21:15 executing program 5: syz_open_dev$evdev(&(0x7f0000000000), 0x10000, 0x20c000) 19:21:15 executing program 1: socket(0xa, 0x3, 0x3b) 19:21:15 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, 0x0) 19:21:15 executing program 4: syz_mount_image$zonefs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100a, &(0x7f0000000400)) 19:21:15 executing program 1: socketpair(0x3, 0x0, 0xfffffbff, &(0x7f0000000000)) 19:21:15 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000), 0x8, 0x133401) 19:21:15 executing program 5: syz_io_uring_setup(0x0, &(0x7f00000015c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001640), &(0x7f0000001680)) 19:21:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000024c0)={'ip6gre0\x00', &(0x7f0000002440)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @loopback}}) 19:21:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x80fe}, r1}}, 0x48) 19:21:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x1, 0xc5, &(0x7f0000000440)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, 0x0}, 0x78) 19:21:15 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 19:21:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x48c}, 0x40) 19:21:15 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r1, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xc0fe}, r1}}, 0x48) 19:21:15 executing program 0: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 19:21:16 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000000c0), 0x1, 0x0) 19:21:16 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000040)) 19:21:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfc00}, r1}}, 0x48) 19:21:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xee01, 0x0) keyctl$setperm(0x5, r0, 0x0) 19:21:16 executing program 4: openat$vfio(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 19:21:16 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000001940)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) 19:21:16 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000200), 0x4) 19:21:16 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x0, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0xfffffce2) 19:21:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYRES32], 0x24}}, 0x0) 19:21:16 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:21:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfe80}, r1}}, 0x48) 19:21:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfec0}, r1}}, 0x48) 19:21:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1300, 0x1) 19:21:16 executing program 3: syz_open_dev$media(&(0x7f0000000000), 0x0, 0x4000) 19:21:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$zonefs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x100a, &(0x7f0000000400)) 19:21:16 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14}, 0x14) socketpair(0x8, 0x0, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000780)={0x14}, 0x14) 19:21:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(twofish)\x00'}, 0x58) 19:21:17 executing program 1: getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, &(0x7f0000000040)) r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000007c0)=""/39) 19:21:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xff00}, r1}}, 0x48) 19:21:17 executing program 5: pselect6(0x0, 0x0, &(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)={0x77359400}, &(0x7f0000001740)={&(0x7f0000001700)={[0xfffffffffffffff7]}, 0x8}) 19:21:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0x5, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) 19:21:17 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) futimesat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x2710}}) 19:21:17 executing program 3: syz_io_uring_setup(0x4368, &(0x7f00000015c0)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 19:21:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x40000}, r1}}, 0x48) 19:21:17 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000700)) 19:21:17 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000001e80), 0x1, 0x0) 19:21:17 executing program 0: socket$caif_seqpacket(0x25, 0x5, 0x5) 19:21:17 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x57, 0x0) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, 0x0) 19:21:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x1000000}, r1}}, 0x48) 19:21:17 executing program 3: socket(0x2c, 0x3, 0x3b) 19:21:17 executing program 0: socketpair(0x21, 0x0, 0x0, &(0x7f00000001c0)) 19:21:18 executing program 5: syz_mount_image$zonefs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000780)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 19:21:18 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x149001, 0x0) 19:21:18 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x2000000}, r1}}, 0x48) 19:21:18 executing program 0: socket(0xa, 0x1, 0x3b) 19:21:18 executing program 4: r0 = socket(0xa, 0x3, 0x3b) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0x0) 19:21:18 executing program 3: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) 19:21:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x6000000}, r1}}, 0x48) [ 531.586798][T26918] zonefs (loop5) ERROR: Not a zoned block device 19:21:18 executing program 3: setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0xffffff6d) [ 531.671602][T26918] zonefs (loop5) ERROR: Not a zoned block device 19:21:18 executing program 0: r0 = socket(0x1, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 19:21:18 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2001) 19:21:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x7000000}, r1}}, 0x48) 19:21:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 19:21:18 executing program 5: socketpair(0x8, 0x0, 0x0, &(0x7f0000000580)) 19:21:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:19 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) bind$rose(r0, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 19:21:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xc000000}, r1}}, 0x48) 19:21:19 executing program 5: epoll_create(0x19) 19:21:19 executing program 0: r0 = socket(0xa, 0x3, 0x3b) sendto$rose(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 19:21:19 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:21:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000005e40)={'ip6tnl0\x00', &(0x7f0000005dc0)={'syztnl0\x00', 0x0, 0x0, 0x9, 0x5, 0xff, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x1, 0x700, 0x472, 0x1a1d}}) 19:21:19 executing program 0: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, "95afcdd26b40d44c3dabb7b85ef6e7f77c35a7b3738d7eb918dca3e3841987ed7c6f128ab50e7bcece633016577ee292434ef2bf2ae76c6dec989ea442e8b518"}, 0x48, 0xfffffffffffffffd) 19:21:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x12000000}, r1}}, 0x48) 19:21:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) 19:21:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) 19:21:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0x3f000000}, r1}}, 0x48) 19:21:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000005e40)={'ip6tnl0\x00', &(0x7f0000005dc0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @local}}) 19:21:20 executing program 5: syz_open_dev$dri(&(0x7f0000000000), 0x86b, 0x104340) 19:21:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfc000000}, r1}}, 0x48) 19:21:20 executing program 4: r0 = socket(0x2, 0x3, 0x7) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0, 0xf0ff7f00000000}}, 0x0) 19:21:20 executing program 0: setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) 19:21:20 executing program 5: syz_open_dev$evdev(&(0x7f0000001240), 0xfffffffffffffffc, 0x140) 19:21:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfe800000}, r1}}, 0x48) 19:21:20 executing program 5: syz_io_uring_setup(0x4368, &(0x7f00000015c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001640), 0x0) 19:21:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) 19:21:20 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x60d81, 0x0) 19:21:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfec00000}, r1}}, 0x48) 19:21:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:21 executing program 5: r0 = socket(0x2, 0x3, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 19:21:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x38, r1, 0x5, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x38}}, 0x0) 19:21:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xff000000}, r1}}, 0x48) 19:21:21 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x1000) 19:21:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x1) 19:21:21 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x40010020) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r1, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 19:21:21 executing program 5: r0 = socket(0x2, 0x3, 0x7) sendmsg$can_j1939(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x18, &(0x7f0000000080)={0x0}}, 0x0) 19:21:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) 19:21:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x100141, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 19:21:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x2}}, 0x48) 19:21:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) 19:21:22 executing program 0: r0 = socket(0x2, 0x3, 0x7) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0, 0xf0ff7f}}, 0x0) 19:21:22 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="0421"], 0x2104}}, 0x0) 19:21:22 executing program 4: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73, 0x49) 19:21:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x4}}, 0x48) 19:21:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 19:21:22 executing program 0: unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x1) faccessat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 19:21:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x6}}, 0x48) 19:21:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x7}}, 0x48) 19:21:22 executing program 3: r0 = socket(0x2, 0x3, 0x7) accept4$packet(r0, 0x0, 0x0, 0x40800) 19:21:22 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x2104}, 0x1, 0x0, 0x0, 0x40480c0}, 0x80) 19:21:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), 0xffffffffffffffff) pipe2$9p(0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) 19:21:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) 19:21:23 executing program 0: unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 19:21:23 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x400140, 0x0) 19:21:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xc}}, 0x48) 19:21:23 executing program 4: sendmsg$SOCK_DESTROY(0xffffffffffffffff, 0x0, 0x0) 19:21:23 executing program 3: socket(0x18, 0x0, 0x510e) 19:21:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x6, &(0x7f0000000540), 0x4) 19:21:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x12}}, 0x48) 19:21:23 executing program 5: bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2", 0x7fffeffb}], 0x2, 0x0, 0x0, 0x1a0}}], 0x1, 0x0) setsockopt$packet_int(r1, 0x107, 0x10, 0x0, 0x0) 19:21:23 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), 0xffffffffffffffff) pipe2$9p(0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) 19:21:23 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 19:21:23 executing program 3: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x989680}, 0x0) 19:21:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) 19:21:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfc}}, 0x48) 19:21:24 executing program 0: syz_mount_image$zonefs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1100092, &(0x7f0000001540)) 19:21:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x400140, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000040)={{r1}, 0x0, 0x2, @unused=[0x4], @subvolid}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000010c0)) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x1) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) 19:21:24 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 19:21:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0xfffffffffffffffe) 19:21:24 executing program 3: r0 = socket(0xa, 0x3, 0x3b) sendto$rose(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:21:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e00}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0x4, 0x4, 0x4, 0xffbf}, 0x40) close(r3) 19:21:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x116, &(0x7f0000000340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:21:24 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 19:21:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x600}}, 0x48) 19:21:24 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) 19:21:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x700}}, 0x48) 19:21:25 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000340)=[&(0x7f00000002c0)='$W@\x00', &(0x7f0000000300)='l2tp\x00'], 0x400) 19:21:25 executing program 4: keyctl$update(0x2, 0x0, &(0x7f0000000000)="93", 0x1) 19:21:25 executing program 3: syz_mount_image$zonefs(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000ac0), 0x800400, &(0x7f0000000dc0)=ANY=[]) 19:21:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xc00}}, 0x48) 19:21:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 538.778235][T27237] zonefs (loop3) ERROR: Not a zoned block device [ 538.866364][T27237] zonefs (loop3) ERROR: Not a zoned block device 19:21:26 executing program 0: pipe2$9p(&(0x7f00000002c0), 0x0) syz_io_uring_setup(0x79ec, &(0x7f0000000040)={0x0, 0xdedf}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 19:21:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001f00), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7, 0x7fff, 0x1000}) 19:21:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x1200}}, 0x48) 19:21:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:27 executing program 3: r0 = socket(0x2, 0x3, 0x7) recvfrom$rose(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 19:21:27 executing program 4: mknodat$loop(0xffffffffffffff9c, 0x0, 0x3f00, 0x1) 19:21:27 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe2$9p(&(0x7f0000000000), 0x84000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 19:21:27 executing program 3: syz_open_dev$evdev(&(0x7f0000001240), 0xfffffffffffffffc, 0x0) 19:21:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x3f00}}, 0x48) 19:21:27 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x44000, 0x0) 19:21:27 executing program 1: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:27 executing program 0: io_uring_setup(0x2714, &(0x7f0000000080)={0x0, 0x0, 0x2}) 19:21:27 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x214002, 0x0) 19:21:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x80fe}}, 0x48) 19:21:27 executing program 5: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:27 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}, 0x1) 19:21:27 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000), 0x4e19, 0x200082) 19:21:27 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0x3938700}, 0x0) 19:21:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xc0fe}}, 0x48) 19:21:27 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000400)) 19:21:27 executing program 0: recvfrom$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:21:27 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) 19:21:28 executing program 1: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001800)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 19:21:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000002dc0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYBLOB="010028bd7000ffdbdf253e0000000e0001"], 0x1a4}}, 0x0) 19:21:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000005b00)={'sit0\x00', &(0x7f0000005a80)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @local}}) 19:21:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfc00}}, 0x48) 19:21:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) 19:21:28 executing program 0: syz_mount_image$zonefs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x184820, &(0x7f0000000180)) 19:21:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[], 0x24}}, 0x0) 19:21:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfe80}}, 0x48) 19:21:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x4, &(0x7f0000000100)=@framed={{}, [@generic={0x2}]}, &(0x7f0000000180)='GPL\x00', 0x1, 0xc5, &(0x7f0000000440)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10}, 0x78) 19:21:28 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) 19:21:29 executing program 1: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfec0}}, 0x48) 19:21:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYRES32], 0x24}}, 0x0) 19:21:29 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:29 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2$9p(&(0x7f0000000000), 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x80002160) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 19:21:29 executing program 4: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) 19:21:29 executing program 0: socket(0x28, 0x0, 0x4a) 19:21:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xff00}}, 0x48) 19:21:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, 0x0, 0x0) 19:21:29 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000014c0)=0x1, 0x4) 19:21:29 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 19:21:29 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 19:21:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x84008000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 19:21:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x40000}}, 0x48) 19:21:30 executing program 5: socket(0x22, 0x0, 0x3b) 19:21:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000001780)={&(0x7f00000015c0), 0xc, &(0x7f0000001740)={0x0}}, 0x0) 19:21:30 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) 19:21:30 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1200, 0x1) 19:21:30 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r0, 0x0, 0x0) 19:21:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x1000000}}, 0x48) 19:21:30 executing program 3: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='.}@}-,^}}:\x00', 0xfffffffffffffffc) 19:21:30 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f00000003c0), 0x0) 19:21:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x2000000}}, 0x48) 19:21:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:31 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f0000002540)=[{0x0}, {&(0x7f00000012c0)="d2", 0x1}], 0x2}, 0x0) 19:21:31 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) 19:21:31 executing program 0: socketpair(0x1e, 0x0, 0x7, &(0x7f0000000000)) 19:21:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x6000000}}, 0x48) 19:21:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001500)={0x1c, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x40) 19:21:31 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 19:21:31 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000014c0), 0x200c01) timerfd_gettime(r0, 0x0) 19:21:31 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000002400), 0xffffffffffffffff) 19:21:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x7000000}}, 0x48) 19:21:31 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f00000038c0)='/sys/class/pps', 0x80000, 0x0) 19:21:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:32 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 19:21:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xc000000}}, 0x48) 19:21:32 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) read$usbmon(r0, 0x0, 0x0) 19:21:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000002600)=[{&(0x7f0000000300)="83", 0x1, 0x10001}], 0x0, 0x0) 19:21:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, 0x0) 19:21:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x84801, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x143202, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880), 0x400, 0x0) 19:21:32 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, 0x0) [ 545.851514][T27511] loop5: detected capacity change from 0 to 256 19:21:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x12000000}}, 0x48) [ 545.966591][T27511] loop5: detected capacity change from 0 to 256 19:21:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000002600)=[{&(0x7f0000000100)}, {0x0}, {&(0x7f0000000300), 0x0, 0x10001}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000001500)={[], [{@hash}, {@context={'context', 0x3d, 'staff_u'}}, {@seclabel}]}) 19:21:32 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000880), 0x0, 0x0) 19:21:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000a40)={'batadv_slave_1\x00'}) [ 546.260628][T27543] loop5: detected capacity change from 0 to 256 [ 546.306733][T27543] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 546.348355][T27543] loop5: detected capacity change from 0 to 256 [ 546.366623][T27543] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:21:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0x3f000000}}, 0x48) 19:21:33 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 19:21:33 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00'}, 0x10) 19:21:33 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 19:21:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:21:33 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x110) r1 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_complete(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@setneightbl={0x1c, 0x43, 0x3afa7362f6a57012, 0x70bd29, 0x25dfdbfb, {0x2}, [@NDTA_THRESH1={0x8, 0x2, 0x51a51756}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4880) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={0xffffffffffffffff, r0, 0x22}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f00000003c0), 0x80000000, 0x10001) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r3, &(0x7f0000000700)={&(0x7f0000000640)={0x24, @short={0x2, 0x0, 0xfffe}}, 0x14, &(0x7f00000006c0)={&(0x7f0000000680)="54f0", 0x2}, 0x1, 0x0, 0x0, 0x40800}, 0x40080) 19:21:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) 19:21:33 executing program 3: syz_io_uring_setup(0x7188, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 19:21:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfc000000}}, 0x48) [ 547.125424][T27585] ieee802154 phy0 wpan0: encryption failed: -22 [ 547.153490][T27586] ieee802154 phy0 wpan0: encryption failed: -22 19:21:33 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:33 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) 19:21:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:34 executing program 3: socket$caif_seqpacket(0x25, 0x5, 0x4) 19:21:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfe800000}}, 0x48) 19:21:34 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x0, 0x0) 19:21:34 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:34 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) read$hiddev(r0, 0x0, 0x0) 19:21:34 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:34 executing program 5: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93", 0x1, 0xffffffffffffaeb5}], 0x0, 0x0) 19:21:34 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000380)) 19:21:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xfec00000}}, 0x48) 19:21:34 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) [ 548.084469][T27622] loop5: detected capacity change from 0 to 16302 19:21:34 executing program 3: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300), 0x10) 19:21:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1, 0xff000000}}, 0x48) 19:21:35 executing program 5: syz_io_uring_setup(0x7188, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x272}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 19:21:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:35 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) 19:21:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:35 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x100000001, 0x1823c1) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0}, 0x2000004) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x40) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0xc172, 0x2, 0x0, 0x2cf}) 19:21:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x7) 19:21:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize=0x0000000000000081,iocharset=']) 19:21:35 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x2c, &(0x7f0000000180)=""/44, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x9}, 0x10}, 0x78) [ 549.128922][T27665] jfs: Unrecognized mount option "iocharset=" or missing value 19:21:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x200000c8) 19:21:36 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) preadv(r2, &(0x7f0000002100)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, 0xd9a, 0xcd) 19:21:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:36 executing program 3: syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x0) getrusage(0x0, &(0x7f00000000c0)) 19:21:36 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) 19:21:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x4, 0x0, [0x3, 0x4, 0x8, 0xc9a9, 0x7, 0x2, 0x8, 0x7, 0x3, 0x8, 0xa98, 0x0, 0x3, 0x2, 0x80000000, 0x6]}, {0x1, 0x0, [0x8, 0x2, 0x40, 0x4, 0x8, 0x100, 0x5, 0xffffff81, 0x7, 0x4, 0x3, 0xff, 0xf4a5, 0x2, 0xe4f, 0x74]}, {0x23, 0x0, [0xfffffffb, 0x0, 0x40, 0x7f, 0x0, 0x40, 0x37, 0x8, 0x20, 0xfffffff8, 0xb, 0x10, 0x0, 0x0, 0x6, 0x400]}, {0x32, 0x0, [0x10000, 0xb9, 0x80, 0x5, 0x9, 0x40, 0xabc86ce, 0x48, 0x0, 0x2, 0x5e8, 0xffffffc0, 0xfffffff7, 0x8000, 0x80000001, 0x81]}, {0x10, 0x0, [0xce6, 0x0, 0x0, 0x4, 0xffffffff, 0x7, 0x49, 0x8001, 0x9824, 0x20, 0x7fffffff, 0x80000001, 0x5298, 0x400, 0x400, 0x8]}, {0x8, 0x0, [0x0, 0x3, 0xfff00000, 0x2, 0x4, 0x1, 0x8000, 0x6e0, 0x6, 0x10001, 0x400, 0x101, 0x7, 0xfffffffe, 0x5, 0x1ff]}, {0x27, 0x0, [0x8, 0x2, 0xd7d7, 0x1f, 0x9, 0xffff, 0x7ff, 0x4, 0x7, 0x1, 0x3, 0x4, 0xebc8, 0x4, 0xfcea, 0xffffffff]}], r2, 0x1, 0x1, 0x1f8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x982, @private1}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0xa1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x9, @local, 0x800}, {0xa, 0x4e23, 0x5, @private0, 0xfffffff7}, r4, 0x16}}, 0x48) 19:21:36 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) 19:21:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = signalfd(r0, &(0x7f0000000080), 0x8) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7ff, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x2}, r2}}, 0x48) 19:21:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@setneightbl={0x14}, 0x14}}, 0x0) 19:21:36 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:37 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) preadv(r2, &(0x7f0000002100)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, 0xd9a, 0xcd) 19:21:37 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/auth_rpcgss', 0x0, 0x0) 19:21:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x200900, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000001240)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000001200), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xffffff4a, @local, 0xffffffff}, {0xa, 0x4e22, 0xdb, @mcast2, 0x8}, r3, 0x3}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r6}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0xffffffffffffff54, 0xfa00, {r6, 0x1}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) lseek(r8, 0x81, 0x0) 19:21:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:37 executing program 4: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a0000d3, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) 19:21:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:37 executing program 3: syz_open_dev$vcsa(&(0x7f0000000400), 0x100000001, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0xc172, 0x2, 0x0, 0x2cf}) 19:21:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r1) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x18, r2, 0x717, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x228, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x65}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9b7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_PUBL={0x4}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x685a}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0xbc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x64010100}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10, @mcast2, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf104}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7a18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x750}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb}]}, @TIPC_NLA_NODE={0xb8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xb3, 0x3, "fe9ed25165954fec8a01acda52a96404634c39e73f85ac4f3f3c7dc7402b9968482bb40bb543db25232ce48bf16d5b417caa3b91b5044b715ecdd71d9c2460dcdf9aae4668b6fcff4b9e9cf68b44f877937988c1b587878dd9fa1b20237f0096ca57516bf93faf09beacd94ed0606a075857e318dc8514b8475146ef6f1457a87311756c7b1fc7b4f8ec5d17ef7f24d1568c4fee1706368f271a894ca48293681b86ea729374c9ad1326a37e3fc12c"}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x228}}, 0x1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r4}}, 0x48) 19:21:38 executing program 3: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/171, 0xab}], 0x1, 0x0, 0x0) 19:21:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:38 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r3, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) preadv(r2, &(0x7f0000002100)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, 0xd9a, 0xcd) 19:21:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x80000001, @dev={0xfe, 0x80, '\x00', 0x25}, 0x80000001}, {0xa, 0x4e23, 0x7ff, @ipv4={'\x00', '\xff\xff', @local}, 0x3}, r1, 0xd16}}, 0x48) 19:21:38 executing program 3: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 19:21:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:38 executing program 4: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, 0x0) 19:21:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:38 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x81, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:38 executing program 3: socket$caif_seqpacket(0x25, 0x5, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc805}, 0x20004080) syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), 0xffffffffffffffff) 19:21:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:39 executing program 2: ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000100)={0x752e0f5f, 0x8, 0x0, 0x8, 0x1b, 0x10000}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup(r0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0xfffffffe}, {0xa, 0x0, 0x0, @empty, 0x1}, r1}}, 0x48) 19:21:39 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={0x0}, 0x10) 19:21:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000140), 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93", 0x1}], 0x0, &(0x7f0000000480)=ANY=[]) 19:21:39 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x106, 0x3}}, 0x20) 19:21:39 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 19:21:39 executing program 4: socketpair(0x1d, 0x0, 0x1ff00, &(0x7f0000000000)) 19:21:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:39 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 19:21:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 19:21:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize=0']) 19:21:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 19:21:40 executing program 3: set_mempolicy(0x4005, &(0x7f0000000080)=0x5, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a0000dd, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) [ 553.559698][T27851] Mount JFS Failure: -22 19:21:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) [ 553.600503][T27851] jfs_mount failed w/return code = -22 19:21:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @local}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffef5, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = signalfd4(r0, &(0x7f0000000340)={[0x3]}, 0x8, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380), 0x2, 0x8}}, 0x20) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @private0}, r1}}, 0x48) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) preadv(r4, &(0x7f0000000300)=[{&(0x7f0000000180)=""/243, 0xf3}, {&(0x7f0000000280)=""/85, 0x55}], 0x2, 0xedac, 0x5) 19:21:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10020, 0x0) 19:21:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:21:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) [ 554.111371][T27879] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 19:21:40 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[]) 19:21:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000010}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x7c, 0x9, 0xb, 0x201, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x2}, [@generic="4990b539e5a9208b7593d44151c88eda1125360e5054bfb3d8534ebb7b8735d378ae2e1db7aeb625201ac855cc60469f7a4af2e464c75d837410edfc201fee648c0e46e53c22d9eaf5aa9c79fa6477e71df43739667d07d6e108ade758d3ca2106fd000000"]}, 0x7c}, 0x1, 0x0, 0x0, 0x20044004}, 0x4000000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r3, 0xffffffff, 0x0, 0x0, 0x0, @ib={0x1b, 0xbb0d, 0x9, {"993b47ef97001191449009955b9e353c"}, 0x8000, 0xff, 0x2}, @in={0x2, 0x4e22, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @loopback}, {0xa, 0x0, 0x2, @empty, 0xfffffffc}, r3}}, 0x48) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x106, 0x5}}, 0x20) 19:21:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) 19:21:40 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:40 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 19:21:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:41 executing program 3: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0x0, 0x2}) 19:21:41 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f00000001c0), 0x401, 0x400800) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000280)={0x9e0000, 0x7fffffff, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x990a62, 0x46900000, '\x00', @string=&(0x7f0000000200)=0x2}}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, r5}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1, @loopback}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, 0x8}, r2}}, 0x48) 19:21:41 executing program 5: io_uring_setup(0x0, &(0x7f0000000380)) 19:21:41 executing program 4: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) 19:21:41 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:21:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:41 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) recvmmsg(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000080)=""/202, 0xca}, {&(0x7f0000000480)=""/4088, 0xff8}], 0x2}}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000003ac0)=""/4110, 0x100e}], 0x1}}], 0x2, 0x100, 0x0) socket$packet(0x11, 0x0, 0x300) 19:21:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x55, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x2, 0x40}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x20, 0x0, [0x0, 0x1, 0x2400, 0xb8, 0x0, 0x1, 0x6, 0x1, 0x7ff, 0x3, 0xdf, 0x8, 0x9, 0x7f, 0x6, 0x1]}], r3, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000300)) 19:21:41 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 19:21:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:41 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 19:21:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x2, 0x9, 0x7, 0x4800, 0xffffffffffffffff}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r1, 0x2, 0x4, 0x6, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 19:21:41 executing program 3: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) 19:21:41 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 19:21:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:42 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize']) 19:21:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000880)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000900)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x2, 0x5}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000980)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000940), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x4, {0x12000, 0x6, "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", 0x7, 0x3, 0x7, 0x7f, 0x1, 0x1, 0x11, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r3}}, 0x48) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$binfmt_elf32(r4, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x1, 0x5, 0xff, 0x3, 0x3e, 0xe9, 0x22b, 0x38, 0x4a, 0x8, 0xa5, 0x20, 0x2, 0x1000, 0x1, 0x932}, [{0x4, 0x6, 0x6b1, 0x0, 0x9, 0x1, 0xffffffff, 0x1f}], "0b7a72001b4ba8f4c3c1b5ee75a5120943ed0f55c73d8378873cc3dd104b49", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x577) 19:21:42 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 19:21:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) 19:21:42 executing program 5: syz_io_uring_setup(0x5685, 0x0, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000380)={0x3, 0x3, 0x3, 0x75}) syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93fad879ad9a4142121babe38178fe323f3a9ae5d5c26c7e49b5cf", 0x1b, 0xffffffffffffaeb5}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize=0x0000000000000081,iocharset=cp861,resize=0x0000000000000000,usrquota,quotars=continue,', @ANYRESDEC, @ANYBLOB=',\x00']) 19:21:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 555.889179][T27970] JFS: Cannot determine volume size [ 555.911487][T27970] Mount JFS Failure: -22 19:21:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize=']) [ 555.934375][T27970] jfs_mount failed w/return code = -22 19:21:42 executing program 2: timer_gettime(0x0, &(0x7f0000000100)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x2, 0x3, 0x401, 0x4}, 0x0, 0x30, 0x8, r1, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, '\x00', [0x4, 0x7, 0xa]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) timer_create(0x3, &(0x7f0000000140)={0x0, 0x3a, 0x0, @tid=r2}, &(0x7f0000000180)=0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0), 0x15, 0x2}}, 0x20) timer_settime(r3, 0x1, &(0x7f00000001c0)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r5}}, 0x48) [ 555.976733][T27977] loop5: detected capacity change from 0 to 16302 [ 556.000437][T27970] JFS: Cannot determine volume size [ 556.010620][T27977] jfs: Unrecognized mount option "quotars=continue" or missing value [ 556.012378][T27970] Mount JFS Failure: -22 [ 556.038181][T27986] jfs: Unrecognized mount option "resize=" or missing value [ 556.053768][T27970] jfs_mount failed w/return code = -22 19:21:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 556.103133][T27986] jfs: Unrecognized mount option "resize=" or missing value [ 556.151196][T28000] loop5: detected capacity change from 0 to 16302 19:21:42 executing program 0: syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x1823c1) 19:21:42 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="05"], 0x0, 0x0) 19:21:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000001c0), 0xffffffff, 0x303040) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x18e, 0x1}}, 0x20) 19:21:42 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) recvmmsg(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000001480)}}], 0x1, 0x100, 0x0) [ 556.193179][T28000] jfs: Unrecognized mount option "quotars=continue" or missing value 19:21:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:42 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_complete(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@setneightbl={0x1c, 0x43, 0x3afa7362f6a57012, 0x70bd29, 0x25dfdbfb, {0x2}, [@NDTA_THRESH1={0x8, 0x2, 0x51a51756}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4880) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f00000003c0), 0x80000000, 0x10001) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 19:21:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 19:21:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @loopback, 0xffffffff}, {0xa, 0x0, 0x0, @empty, 0xbc87}, r1}}, 0x48) 19:21:43 executing program 0: io_uring_setup(0x42db, &(0x7f0000000000)={0x0, 0x0, 0x8}) 19:21:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(0x0, r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:43 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:21:43 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) 19:21:43 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/auth_rpcgss', 0x801, 0x0) 19:21:43 executing program 3: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}}], 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x200040, 0x0) 19:21:43 executing program 0: sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 19:21:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(0x0, r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0xffffffffffffaeb5}], 0x0, &(0x7f0000000480)=ANY=[]) 19:21:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}, {0xa, 0x4e21, 0x0, @empty, 0x7}, 0xffffffffffffffff, 0xb13}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffebf, 0xfa00, {0x8000000000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = signalfd(r0, &(0x7f0000000040)={[0x81]}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r3}}, 0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0xfffffffffffffffa, &(0x7f0000000380)=[0xffffffffffffffff], 0x1}, 0x2) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, "ca181e", "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"}}, 0x110) syz_io_uring_setup(0x551, &(0x7f0000000340)={0x0, 0x20, 0x0, 0x80, 0x312}, &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4004, @fd_index, 0x80, 0x0, 0xfffffff9, 0x4, 0x1}, 0x0) r6 = syz_io_uring_setup(0x1a5, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ee8000/0x2000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000500)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000d, 0x13, r6, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) close(r10) syz_io_uring_submit(r9, r8, &(0x7f0000000040)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r10, 0x0, 0x0}, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x1, {0x0, r11}}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r2, 0x0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)=""/68, 0x44}, {&(0x7f0000000300)=""/214, 0xd6}, {&(0x7f0000000400)=""/18, 0x12}], 0x3}, 0x0, 0x10042, 0x0, {0x0, r11}}, 0x7) 19:21:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) preadv(r2, &(0x7f0000002100)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, 0xd9a, 0xcd) 19:21:43 executing program 3: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}}], 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x200040, 0x0) 19:21:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000200)=[{0x0, 0x0, [0x8, 0x1, 0x8, 0x1, 0x3f, 0x37a858, 0x400, 0x81, 0xf82, 0x1ff, 0x6, 0xfffffffd, 0x7fff, 0x2, 0xfffffff8, 0x8]}, {0xd, 0x0, [0x80000000, 0x7f, 0xc8, 0x10000, 0x4, 0xd13, 0x3, 0x5, 0x8000, 0x8, 0x3, 0xbe0000, 0xfff, 0x7, 0x392, 0x1]}, {0x0, 0x0, [0x5, 0x50be, 0x7, 0x9, 0x1, 0x80, 0x8000, 0x0, 0x1, 0x0, 0x3, 0x4e, 0x1, 0x0, 0x4, 0x914]}], r3, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/connector\x00') write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r1, 0xe}}, 0x10) 19:21:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(0x0, r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 558.183560][T28084] loop4: detected capacity change from 0 to 16302 [ 558.253635][T28084] Mount JFS Failure: -22 19:21:45 executing program 3: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) syz_io_uring_setup(0x5685, &(0x7f0000000000)={0x0, 0xa2a2, 0x0, 0x2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x54f}, 0x0) syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93fad879ad9a4142121babe38178fe323f3a9ae5d5c26c7e49b5cfbb7abbe1b0dfb1d27ef8d3d1c3f268fa01ca7a84a6b605f75b9d53e038fbcc32f26fb6f9909d5901307ab948e39ae6e5aeebaf272039d7ec27d37b8765f60e950cbab00d2a5846a3dda15c47bb2308a0ce09dd9e2340f1b9d5b5139651488b37a2b10e09c957db", 0x82, 0xffffffffffffaeb5}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="67727071756f74612c6e6f696e746567726974792c726573697a653d3078303030303030303030303030303038312c696f636861727365743d63703836312c726573697a653d3078303030303030303030303030303030302c75737271756f74612c71756f746172733d636f6e74696e75652c6572726f72733d72656d6f756e742d726f2c67727071756f74612c6673757569643d30612836353765312d6466da372d613130342d626234652d35366166623361382c7063723d30303030303030303030303030303030303035302c6d6561737572652c7065726d69745f646972656374696f2c7569643c", @ANYRESDEC, @ANYBLOB=',']) 19:21:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x7}, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, r2}}, 0x48) [ 558.837162][T28084] jfs_mount failed w/return code = -22 19:21:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:45 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 559.055496][T28098] loop3: detected capacity change from 0 to 16302 19:21:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x6, 0x3, @dev={0xfe, 0x80, '\x00', 0x14}}, {0xa, 0x4e23, 0x0, @private0}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x40, @dev={0xfe, 0x80, '\x00', 0x42}, 0x1}, {0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7f}, r4, 0xff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) [ 559.151164][T28098] jfs: Unrecognized mount option "quotars=continue" or missing value 19:21:46 executing program 4: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0x0, 0x2, 0x0, 0x2cf}) 19:21:46 executing program 2: ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) fchmod(r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000001280)=@urb_type_interrupt={0x1, {0x6, 0x1}, 0x1, 0x40, &(0x7f0000001740)="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", 0x1000, 0x2, 0xfff, 0x0, 0x7ff, 0x17bb, &(0x7f0000001200)="2ca2aa0b60c8411d5162475fa8ed4abd32768f0a3561d1757d2683bd024bc22b04e403ae6d15cf75e60deea4cae9cf90e05b383c2c59d3c717f9dc2ed3f89ad52dce65e5724f7847be3c7d8270803996672d2bf3cb"}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19, 0xfff, 0x8, 0x200, 0x410, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x40) fcntl$getownex(r3, 0x10, &(0x7f0000000140)) 19:21:46 executing program 3: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) syz_io_uring_setup(0x5685, &(0x7f0000000000)={0x0, 0xa2a2, 0x0, 0x0, 0x1c6}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 19:21:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) preadv(r2, &(0x7f0000002100)=[{&(0x7f0000000000)=""/120, 0x78}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, 0xd9a, 0xcd) 19:21:46 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[]) 19:21:46 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x48, 0x30, 0x53b, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000002300)={&(0x7f0000002180), 0xc, &(0x7f00000022c0)={&(0x7f00000021c0)={0xe0, 0x1, 0x9, 0x0, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0x74, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xc}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x9}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xffffffff}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20004085}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x27, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000002340)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:21:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r5}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0x3f, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) 19:21:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:46 executing program 3: syz_open_dev$vcsa(&(0x7f0000000140), 0x2, 0x81) 19:21:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:21:46 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x1d, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0x0, 0x2, 0x0, 0x2cf}) 19:21:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x80900, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x4, 0x5, 0x1, 0x19, 0x81, 0xfa, 0xfa}, r1}}, 0x120) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x8, @private0, 0x9bf}, r1}}, 0x30) 19:21:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x16, 0x0, 0x41, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x7f, 0x5}, 0x40) 19:21:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @remote, 0x1000}, {0xa, 0x4e22, 0x2, @remote, 0x8}, r3, 0x5}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x3, r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0xfffffff8, @mcast2, 0xffff}}}, 0xa0) 19:21:47 executing program 3: syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) syz_io_uring_complete(0x0) 19:21:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$HIDIOCSFLAG(r0, 0x4004480f, 0x0) 19:21:47 executing program 3: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 19:21:48 executing program 5: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 19:21:48 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', 0x0, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:21:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:48 executing program 0: socket$can_j1939(0x1d, 0x2, 0x7) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) [ 561.526720][ T26] audit: type=1326 audit(1632079308.100:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834020b739 code=0x7ffc0000 [ 561.583696][ T26] audit: type=1326 audit(1632079308.100:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834020b739 code=0x7ffc0000 [ 561.619224][ T26] audit: type=1326 audit(1632079308.130:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f834020b739 code=0x7ffc0000 [ 561.679291][ T26] audit: type=1326 audit(1632079308.130:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834020b739 code=0x7ffc0000 [ 561.741500][ T26] audit: type=1326 audit(1632079308.130:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f834020b739 code=0x7ffc0000 [ 561.773796][ T26] audit: type=1326 audit(1632079308.130:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f834020cda7 code=0x7ffc0000 [ 561.808762][ T26] audit: type=1326 audit(1632079308.140:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f83401be6cc code=0x7ffc0000 [ 561.912438][ T26] audit: type=1326 audit(1632079308.140:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f83401be604 code=0x7ffc0000 [ 561.952891][ T26] audit: type=1326 audit(1632079308.140:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f83401be604 code=0x7ffc0000 [ 561.986281][ T26] audit: type=1326 audit(1632079308.140:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28188 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f834020cda7 code=0x7ffc0000 [ 562.043912][T28210] serio: Serial port pts0 [ 562.130695][ T1356] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.137784][ T1356] ieee802154 phy1 wpan1: encryption failed: -22 19:21:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:21:49 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@map}, 0x10) 19:21:49 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', 0x0, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:21:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xe1, &(0x7f0000000340)="c4ca9107780df864342f5fb069a0e1167d0561526b7b049ef7a22899f37ba79cdc792bfbd41b0658be8de5700000000000000000000000000090184dd8430d0ed18bfdaef8476eac66a6d2d51c1e12a1b7364c285ff18c3d459257890edcad78e822543424535f7ef5e28fb84ea6e363600f7ec4dbcd0d485b8972f545365435aea80749af4b657364ed68a905495c03dd6ebe2f936f18cf6198bdffad0ce9ff66e23287b3770836dfca046064525f525e6e516bf55196d15a0d4b70cee12beb0a72980fc2a76ef49f5bda71cdacdd38d47054bac275ddf33076aabcdbdad32bb5"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:21:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)=[@assoc]}], 0x13c, 0x0) 19:21:49 executing program 0: syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x40) 19:21:49 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'bridge_slave_0\x00'}) 19:21:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x7f}, 0x40) 19:21:49 executing program 3: bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) 19:21:50 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) 19:21:50 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x0) 19:21:50 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 563.588567][T28247] new mount options do not match the existing superblock, will be ignored [ 563.652336][T28247] new mount options do not match the existing superblock, will be ignored [ 564.005607][T28258] serio: Serial port pts0 19:21:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:21:50 executing program 3: fanotify_init(0x0, 0x8000) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) syz_io_uring_complete(0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x42) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000008c0), 0xffffffffffffffff) 19:21:50 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 564.467186][T28274] serio: Serial port pts0 19:21:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x8801) 19:21:52 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 19:21:52 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x110) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@setneightbl={0x1c, 0x43, 0x3afa7362f6a57012, 0x70bd29, 0x25dfdbfb, {0x2}, [@NDTA_THRESH1={0x8, 0x2, 0x51a51756}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4880) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 19:21:52 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) [ 566.096801][T28293] new mount options do not match the existing superblock, will be ignored 19:21:52 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_complete(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={0x0}}, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f00000003c0), 0x0, 0x10001) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 19:21:52 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:52 executing program 5: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:52 executing program 3: syz_io_uring_setup(0x7188, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 566.262477][T28304] new mount options do not match the existing superblock, will be ignored [ 566.295360][T28306] new mount options do not match the existing superblock, will be ignored 19:21:53 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 566.351479][T28311] new mount options do not match the existing superblock, will be ignored 19:21:53 executing program 5: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:53 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x100000001, 0x1823c1) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x200480c1}, 0x2000004) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}}, 0x20000000) r1 = syz_open_dev$vcsa(&(0x7f0000000400), 0x1d, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x2, 0x2000) r2 = syz_open_dev$vcsa(&(0x7f0000000340), 0x0, 0x400000) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x40) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0xc172, 0x2, 0x0, 0x2cf}) [ 566.498903][T28319] new mount options do not match the existing superblock, will be ignored [ 566.539341][T28321] new mount options do not match the existing superblock, will be ignored 19:21:53 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 566.735687][T28332] new mount options do not match the existing superblock, will be ignored 19:21:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 19:21:53 executing program 5: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:53 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/net2272', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), r0) [ 566.996990][T28341] new mount options do not match the existing superblock, will be ignored [ 567.628050][T28353] serio: Serial port pts0 19:21:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) 19:21:54 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x2c, &(0x7f0000000180)=""/44, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:21:54 executing program 5: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) 19:21:54 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000000400)) [ 568.167937][T28364] new mount options do not match the existing superblock, will be ignored [ 568.197464][T28368] new mount options do not match the existing superblock, will be ignored 19:21:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001980), r0) 19:21:54 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:54 executing program 3: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) syz_io_uring_setup(0x5685, &(0x7f0000000000)={0x0, 0xa2a2, 0x0, 0x2, 0x1c6}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93fad879ad9a4142121babe38178fe323f3a9ae5d5c26c7e49b5cfbb7abbe1b0dfb1d27ef8d3d1c3f268fa01ca7a84a6b605f75b9d53e038fbcc32f26fb6f9909d5901307ab948e39ae6e5aeebaf272039d7ec27d37b8765f60e950cbab00d2a5846a3dda15c47bb2308a0ce09dd9e2340f1b9d5b5139651488b37a2b10e", 0x7e, 0xffffffffffffaeb5}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="67727071756f74612c6e6f696e746567726974792c726573697a653d3078303030303030303030303030303038312c696f636861727365743d63703836312c726573697a653d3078303030303030303030303030303030302c75737271756f74612c71756f746172733d636f6e74696e75652c6572726f72733d72656d6f756e742d726f2c67727071756f74612c6673757569643d30612836353765312d6466da372d613130342d626234652d35366166623361382c7063723d3030303030303030303030303030303030303530", @ANYRESDEC, @ANYBLOB=',\x00']) 19:21:55 executing program 5: getresuid(&(0x7f0000000080), 0x0, &(0x7f0000000100)) [ 568.374755][T28379] new mount options do not match the existing superblock, will be ignored [ 568.410357][T28384] loop3: detected capacity change from 0 to 16302 19:21:55 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 568.443589][T28384] jfs: Unrecognized mount option "quotars=continue" or missing value 19:21:55 executing program 5: syz_io_uring_setup(0x7188, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 568.551695][T28394] loop3: detected capacity change from 0 to 16302 [ 568.556276][T28395] new mount options do not match the existing superblock, will be ignored [ 568.590574][T28394] jfs: Unrecognized mount option "quotars=continue" or missing value [ 569.509682][T28414] serio: Serial port pts0 19:21:58 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x110) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) r1 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_complete(0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000380)) syz_open_dev$vcsa(&(0x7f00000003c0), 0x80000000, 0x10001) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r2, &(0x7f0000000700)={&(0x7f0000000640)={0x24, @short={0x2, 0x0, 0xfffe}}, 0x14, &(0x7f00000006c0)={&(0x7f0000000680)="54f0", 0x2}, 0x1, 0x0, 0x0, 0x40800}, 0x40080) 19:21:58 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:21:58 executing program 5: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:21:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8), 0x0, 0x0) 19:21:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) 19:21:58 executing program 2: ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000001c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000280)={&(0x7f0000000200)=[r2], 0x2, 0x1, 0x7, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, r3], 0xfa, 0x3, 0x5}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f00000002c0)=[r0, 0x0, 0x0, r1], &(0x7f0000000300)=[r3], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f0000000240)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x6, 0x2, 0x0}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) sendfile(r6, r5, 0x0, 0x7ffff000) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000001c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000280)={&(0x7f0000000200)=[r9], 0x2, 0x1, 0x7, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, r10], 0xfa, 0x3, 0x5}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r5, 0xc01864cd, &(0x7f0000000340)={&(0x7f00000002c0)=[r7, 0x0, 0x0, r8], &(0x7f0000000300)=[r10], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000002c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, r3, 0x0, r4, r10, 0x0, 0x0], 0xfd, 0x3}) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r11, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r12}}, 0x48) 19:21:58 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 572.156936][T28422] new mount options do not match the existing superblock, will be ignored [ 572.191699][T28427] ieee802154 phy0 wpan0: encryption failed: -22 19:21:58 executing program 3: setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000000), 0x4) socketpair(0x9, 0x0, 0x0, &(0x7f00000001c0)) 19:21:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x800000000, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xb24f8d45b692658e, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x7c54af31037622dc, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r5, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e23, @private=0xa010100}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0xde, @loopback, 0x7}, {0xa, 0x4e21, 0x4, @local, 0x100}, r1, 0x200}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:21:58 executing program 5: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x7133c000) 19:21:58 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 572.283010][T28435] new mount options do not match the existing superblock, will be ignored 19:21:58 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 19:21:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@private2={0xfc, 0x2, '\x00', 0x41}, 0x3, 0x0, 0xff, 0xb, 0x4, 0x7f}, &(0x7f0000000140)=0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 19:21:59 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)) 19:21:59 executing program 5: socketpair(0x9, 0x0, 0x0, &(0x7f00000001c0)) [ 572.460120][T28449] new mount options do not match the existing superblock, will be ignored [ 572.649093][T28463] serio: Serial port pts0 19:21:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8), 0x0, 0x0) 19:22:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) 19:22:02 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:02 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f00000002c0)=[{}, {}, {}, {0xffffffffffffffff, 0x200}, {}], 0x5, 0x0) 19:22:02 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x40280, 0x0) 19:22:02 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r0}}, 0x48) 19:22:02 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8), 0x0, 0x0) 19:22:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='grpquota,nointegrity,resize=0x000000000000008']) [ 575.677082][T28488] new mount options do not match the existing superblock, will be ignored 19:22:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:22:02 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 575.831339][T28507] resize option for remount only [ 575.871024][T28506] serio: Serial port pts0 19:22:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x3b, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x13f, 0x1}}, 0x20) signalfd(r0, &(0x7f0000000180)={[0xc34]}, 0x8) [ 575.890169][T28507] resize option for remount only 19:22:02 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:02 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f00000002c0)=[{}, {}, {}, {0xffffffffffffffff, 0x200}, {}], 0x5, 0x0) 19:22:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:05 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/nvmem', 0x381000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 19:22:05 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) fallocate(r0, 0x5c, 0x4, 0x7) 19:22:05 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f00000002c0)=[{}, {}, {}, {0xffffffffffffffff, 0x200}, {}], 0x5, 0x0) 19:22:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18}], 0x18}], 0x1, 0x0) 19:22:05 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x3, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/228, 0xe4) 19:22:05 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x6, 0xab5, 0x100, 0xa0, r0, 0xf9, '\x00', 0x0, r1, 0x4, 0x5, 0x5}, 0x40) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r3}}, 0x48) 19:22:05 executing program 5: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0xffffffffffffaeb5}], 0x0, 0x0) 19:22:05 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) poll(&(0x7f00000002c0)=[{}, {}, {}, {0xffffffffffffffff, 0x200}, {}], 0x5, 0x0) 19:22:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, {0xa, 0x4000, 0x800, @empty}, r2, 0x26}}, 0x48) [ 579.172261][T28590] loop5: detected capacity change from 0 to 16302 [ 579.276576][T28590] loop5: detected capacity change from 0 to 16302 [ 579.459357][T28613] serio: Serial port pts0 19:22:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001200)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @ib={0x1b, 0x6, 0x0, {"7e18a18353910517e329b4281e32d223"}, 0x1, 0xb28, 0x4}}}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) sync_file_range(r2, 0x20, 0x3ff, 0x5) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:22:09 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:09 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0), 0x0, 0xffffffffffffaeb5}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB]) 19:22:09 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 19:22:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18}], 0x18}], 0x1, 0x0) 19:22:09 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 582.535217][T28637] loop5: detected capacity change from 0 to 16302 19:22:09 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 582.658216][T28637] loop5: detected capacity change from 0 to 16302 19:22:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0x48) 19:22:09 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:09 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) [ 582.743529][T28661] new mount options do not match the existing superblock, will be ignored 19:22:09 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 582.853871][T28667] new mount options do not match the existing superblock, will be ignored 19:22:09 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:09 executing program 5: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="93", 0x1}], 0x0, 0x0) 19:22:09 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) sched_setattr(r0, &(0x7f0000000200)={0x38, 0x6, 0x2, 0x0, 0x20, 0xff, 0x8, 0x2, 0x9, 0x8}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r3, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r5}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000500)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r6, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0xa, 0x4e23, 0x5, @mcast2, 0x1}, r5, 0x1ff}}, 0x48) [ 583.068024][T28692] new mount options do not match the existing superblock, will be ignored 19:22:09 executing program 0: exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 583.193234][T28699] serio: Serial port pts0 19:22:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280), 0x106, 0x2}}, 0x20) r3 = dup2(r0, r0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x8000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @dev={0xfe, 0x80, '\x00', 0x25}, 0x8001}, {0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00', 0xfffffffa}, r5, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) 19:22:12 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) openat$userio(0xffffffffffffff9c, 0x0, 0x2, 0x0) 19:22:12 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x2bcf) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000040), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) shutdown(0xffffffffffffffff, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x0) sync_file_range(0xffffffffffffffff, 0xb46a, 0xfe9, 0x1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) unshare(0x38020c00) 19:22:12 executing program 0: exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18}], 0x18}], 0x1, 0x0) 19:22:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xe46f, 0xffffffff, {"c66ee947da6ceeb1db3501ba40379ecf"}, 0x7, 0x9, 0x2}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:22:12 executing program 0: exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xedf}, r1}}, 0x48) 19:22:13 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 19:22:13 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 586.488392][T28725] sit0 speed is unknown, defaulting to 1000 19:22:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = dup(r0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x40}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 587.247055][T28768] serio: Serial port pts0 [ 587.369212][T28769] sit0 speed is unknown, defaulting to 1000 19:22:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:16 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:16 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0) 19:22:16 executing program 2: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, 0x15, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x44804}, 0x20048040) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:22:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80)}], 0x1, 0x0) 19:22:16 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000400), 0x100000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2000004) syz_open_dev$vcsa(&(0x7f0000000400), 0x1d, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000340), 0x0, 0x400000) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000400), 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x2bc7, &(0x7f0000000380)={0x0, 0xc172, 0x2, 0x0, 0x2cf}) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) 19:22:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) 19:22:16 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) 19:22:17 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:17 executing program 2: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000200)={0x0, 0x0, 'client0\x00', 0x3, "5644a425ce224434", "5c438f84b90f2a488c1b0dca3162467232e97cae2628b52bf43287175ae067d8", 0x6, 0x101}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000002c0), 0xffffffff, 0x8000) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, {0xa, 0x0, 0x0, @private0, 0x4}, r3}}, 0x48) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000380)={0x80000000, 0x1, 0x100, {0x7, 0xd4}, 0x401, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x106, 0x1}}, 0x20) 19:22:17 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 590.492153][T28857] ieee802154 phy0 wpan0: encryption failed: -22 19:22:17 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 590.775867][T28876] serio: Serial port pts0 19:22:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) 19:22:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 19:22:19 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:19 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:19 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80)}], 0x1, 0x0) 19:22:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r4}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000280)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x13ee22f443b23802}}, 0x20) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r5, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x676, @rand_addr=' \x01\x00', 0x7ff}, {0xa, 0x4e24, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf2}, r1, 0x1}}, 0x48) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r6, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x7fffffff, @private1, 0xed6}, {0xa, 0x4e22, 0x101, @mcast1, 0x400}, r4, 0xff}}, 0x48) 19:22:20 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:20 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) 19:22:20 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:20 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 593.816167][T28922] serio: Serial port pts0 19:22:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:23 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r3}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r4}}, 0x48) 19:22:23 executing program 5: io_uring_setup(0x2bc7, &(0x7f0000000380)) 19:22:23 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:23 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80)}], 0x1, 0x0) 19:22:23 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:23 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_complete(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xcff86e0bd88bd83b}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@setneightbl={0x1c, 0x43, 0x3afa7362f6a57012, 0x70bd29, 0x25dfdbfb, {0x2}, [@NDTA_THRESH1={0x8, 0x2, 0x51a51756}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4880) syz_open_dev$vcsa(&(0x7f00000003c0), 0x80000000, 0x10001) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 19:22:23 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 19:22:23 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:23 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 597.285362][T28973] serio: Serial port pts0 19:22:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x3c, 0x0, @ib={0x1b, 0x200, 0x1, {"7d2fd030f9fdffb25d3bfc31fd2a3de5"}, 0x3c6, 0x5, 0x200}}}, 0x90) r2 = dup(r0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x2}}, 0x18) 19:22:26 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:26 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 19:22:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)}], 0x1, 0x0) 19:22:26 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001bc0)=""/4091, 0xffb}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 19:22:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) r4 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff33a70e4dc4193cac18e78551e6ae5dc926959b167fc09e23ec3679d818a05d29fe4df3f31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb58b070440dcff74c4c00b0e13212a55db69f2a6bdc6f9baf4ca444f46ac0af3f519cb8ce0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b2a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1dee58e7ef72e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a0142d3a0cfbef22b1a264c62328e5f93aa752b9780f51b079312eec1c06917a4b9aba"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000005c0), 0x201, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = syz_open_dev$vcsa(&(0x7f0000000600), 0x7f, 0xb8001) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r10 = syz_open_dev$midi(&(0x7f0000000640), 0x3f, 0x200000) r11 = syz_mount_image$hfsplus(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0xfffffffffffffffb, 0x3, &(0x7f0000000840)=[{&(0x7f0000000700)="30731ee07186a946bc250e45ee9159cb2ebce40c56369e3b82dde745e6cb0ff9c5dd33a4678ddf6dcf2cdc82bda56b4780933207b452b447b7a4c739509cbcaae916fc5d497aa39d750843fa0e98075cb0318d4b05cb970dbc772da05d5da7376ca80e6b446abf5d032adc5c435cc3742bdc3d0cd8e5", 0x76, 0x3958d447}, {&(0x7f0000000780)="83c3d36a0b50fc37b46d653e17b285b198aab2a984ad", 0x16, 0x77f688f8}, {&(0x7f00000007c0)="f37986b798319a3982eebe565cfb59494c61f0071b7c4222527fa472c567063024ec0ed11a08b8796a50f1828cee8a4c27402a1ed3e6d83191278cacabdb4ece9f6093f8a0bd53baf7d6022831060b97aaf48795", 0x54, 0x5f4}], 0x2a02004, &(0x7f00000008c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@nobarrier}, {@force}, {@force}], [{@smackfshat={'smackfshat', 0x3d, '.{{-6q'}}, {@fowner_eq}, {@measure}, {@seclabel}, {@subj_role}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@appraise_type}]}) r12 = eventfd2(0x8, 0x140000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f00000019c0)={'wg1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000001a00)={0xa, 0x7ff, 0x2, 0x1, 0x200, 0xffffffffffffffff, 0x9594, '\x00', r13, r8, 0x3, 0x0, 0x1}, 0x40) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000980)=[{{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000180)="6d22fde7841e22b12e6b", 0xa}, {&(0x7f00000001c0)="b9bfa3176c0b2ea43c8f2ea253bc254caf98f65f74f79ffde1aa3d7458a9b8b8c69c128d2f0953e9f251d3fce022861c5f90ef7f67c58dd9aa7083f5db70c3bbe0efc458fde6dc23fb905b2da8674adb55a016aceffb7f1de30fdcb0bb44661a857accaf727937c9a6ce5f3370c43707e13441bc2f4ae336246610f71b71eb8e71e867ea15ff45a3a38cfea231439b183799553e28", 0x95}, {&(0x7f0000000280)="7ae23d0047bcfa426eb42f84ef471bb95f25e7459a8a0e53afb012f2dd0fd372d438feb136b2d9cf4e4c90db84842f4ab97760a7a94623f4b4b17f3729507fce0d4c669276b0993af79022c4d13ce6c31834aec3c9af145d5ec71acbcd913554eb3e0787052a8c0f938d115c9a381c782087adb32a001da1", 0x78}, {&(0x7f0000000300)="feb9503b6cd41011715b7307c3b0ca11eac8b788b3a3cc09963cedb9095800037b9de6a1d3e9b70d35fce30086e298ab8cfa9904071da31d7b1696d9646ee9e6628069758058b8009e3f08eafa648a7623d6377058d8ad1b8972f82e7c590b601c372263378d8f1e86128983e9190ad0820b4bfa831022ead9f8c915b561b5f90399f08f2a9ae1b8766297103d78d8a1a2f35301731a444267cf595fff9c66e381b120e600284c33be65525b9b4eb5b3a41f1d302f2e1099d7ab7e96e06beeabfa9dba66bff1d92f88", 0xc9}, {&(0x7f0000000400)="1eb3edcc8e36755bb8a800c790d0c6", 0xf}], 0x5, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r4, r0, r5, r0, r0, r6, r7, r8, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r9, r0, r0, r0, r10]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r11, r0, r12]}}], 0xa0, 0x50}}], 0x1, 0x20000041) 19:22:27 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:27 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 600.550685][T29009] loop2: detected capacity change from 0 to 264192 19:22:27 executing program 5: syz_emit_ethernet(0x6a, &(0x7f0000000100)={@random="054dcbc46984", @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x0, 0xfffffffffffffe7a, 0x0, @wg=@cookie={0x3, 0x0, "374836e6bac9627d5b5e2b762c48f2987be472950df39ed5", "d47f261cfafb066ee7f0b73dee26dfd76a8c8c8da3a11f9c22d4802ddb289e00"}}}}}}, 0x0) 19:22:27 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x106, 0x2}}, 0x20) [ 600.719707][T29026] new mount options do not match the existing superblock, will be ignored 19:22:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x37}, [@ldst={0x5, 0x0, 0x6, 0x0, 0x0, 0x40}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x2a) 19:22:27 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 600.891099][T29043] new mount options do not match the existing superblock, will be ignored [ 601.043220][T29048] serio: Serial port pts0 19:22:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:30 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x101}, {0xa, 0x4e20, 0x480, @mcast2, 0x3}, r3, 0x9}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffff}, {0xa, 0x4e21, 0x5777, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1}, r4, 0x7ff}}, 0x48) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x81, @loopback, 0xd92}, r7}}, 0x30) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r5, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0xffff, 0x6, @loopback, 0x8}, {0xa, 0x0, 0x0, @empty}, r1, 0xfffffffc}}, 0x48) 19:22:30 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x3e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x31) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 19:22:30 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)}], 0x1, 0x0) 19:22:30 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 604.015784][T29069] new mount options do not match the existing superblock, will be ignored 19:22:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) 19:22:30 executing program 2: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 604.113933][T29082] serio: Serial port pts0 19:22:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 604.186695][T29088] new mount options do not match the existing superblock, will be ignored 19:22:30 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049ce) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="232120039d4beb7e0e43a62a62d49f71a2f6d6b72958f8f50dc0d2e6284ca362f9f7b3e79682239defc9d32c4a47eb8a82b1d243cbca3f47ecafb29565d9ed76b6ba902fa09d291e85c79fdb06f6d1f418113dc3d7158ef07437c48c5f99c364d383f10d5bbce3f09797c4905277d13009"], 0x191) close(r0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 19:22:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r3}}, 0x48) write(0xffffffffffffffff, &(0x7f00000001c0)="ad2b62d409a1db83651fad92f22af6962c6a6b4c307d7cb7162f8c7c898967e1c6cd6c485ec74882e2cabe837983260916e905bb56801c7b6f7ab00b352c10a4471babb5e4488b98938e4a8e61d8ad81785d57cf4642279779b401268519707a00bad23eefed38e069b7901f3bc285cd0cc5ab869d1023d3452577d67b1cc6acb8c50c92c11e116f7037a527c03f0b8e4195", 0x92) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r3, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r4}}, 0x48) 19:22:33 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:33 executing program 5: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000258f88)) msgsnd(r0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgsnd(r0, &(0x7f0000000100)={0x1}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 19:22:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0x0, &(0x7f0000000140)}], 0x1, 0x0) [ 607.140317][T29131] new mount options do not match the existing superblock, will be ignored 19:22:33 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB="ff460d0000150000140012800b00010076786c616e0000000400028008000a002615a3053e9a2acb9f02b661df5c081840aefdab538e37cdef21c4cca2aece429db99c34372e53b870"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) fcntl$setlease(r0, 0x400, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x80, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0xa9a1968131d4b7e9, 0x2}}, 0x20) 19:22:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000480)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r1, &(0x7f0000000280)="4103092c1116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) [ 607.303636][T29147] new mount options do not match the existing superblock, will be ignored 19:22:33 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4e21, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x2, 0x8}}, 0x20) [ 607.409254][T29160] af_packet: tpacket_rcv: packet too big, clamped from 62197 to 32638. macoff=82 [ 607.520100][T29167] new mount options do not match the existing superblock, will be ignored [ 607.657932][T29171] serio: Serial port pts0 19:22:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:37 executing program 5: set_mempolicy(0x3, &(0x7f0000000280)=0x7, 0x6) fork() 19:22:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = syz_mount_image$zonefs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x4, &(0x7f0000000500)=[{&(0x7f0000000180)="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", 0xfe, 0x101}, {&(0x7f0000000280)="c334a456d11aa530019d258327a9b36d6f8a85a9b6461f9783ec09f623538e8039068798954480835232fa00a410b2539bd4ea3e68b67b31ca0148f16a1f9dd091ac444d74d8c6bf4acd66effa72c0a2b2f0b6019fc33fdc66f6d4b400cad81c06c17d8fb1dc863a109555ba2f95395660997e0cb65528a25c8612dfc784b856cd7f1c8b59adc32145f3a378ed6529ef5a454df958c0d3f7aaefaeee9c8b30328ae40834c0c4057d7eec51b8c190b793e288cf743df1ed6f0e3a2dac0b0f9533ae50fb32062905", 0xc7, 0x80000001}, {&(0x7f0000000380)="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", 0xfe}, {&(0x7f0000000480)="27b4261c6af48b84761d022c6f3b74509d66b29a536521930443108325d1303ae12649d9a48cb08847c65baaf3228cf3efbbf2201967bceb12da130cbfac98deaff9566e36b8d285f182a5967e500b40ef5a5a728dd04cdb9daf3165e2d57c9e96f82f786b9462d53ab25d0cceba7cadbbf80d67a8de2891872096", 0x7b, 0x8}], 0x4014, &(0x7f0000000680)=ANY=[@ANYBLOB="6578706c696369742d6f70656e2c657569643da3d029f57fe0775da07b206c7520e253bf2855e91bb546e2b4672989fece4f81cf3b36", @ANYRESDEC=0xee01, @ANYBLOB="2c66756e633d46494c455f434845434b2c6f626a5f747970653daf5b2c736d61636b6673666c6f6f723d002c726f6f74636f6e746578743d73797361646d5f752c6f626a5f726f6c653d273a5b7d407b2c686173682c00"]) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000a00)={{r3}, "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"}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000600)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}, {0xa, 0x4e23, 0x0, @empty, 0x8001}, r1, 0x81}}, 0x48) 19:22:37 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001bc0)=""/4091, 0xffb}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) pkey_free(0xffffffffffffffff) [ 610.639225][T29190] loop2: detected capacity change from 0 to 264192 19:22:37 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0xd, 0xfffffffffffffe79}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x3}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x2a) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x40, &(0x7f0000000040)) [ 610.703672][T29190] zonefs (loop2) ERROR: Not a zoned block device 19:22:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty, 0xfffffffa}, r1, 0x1}}, 0x48) 19:22:37 executing program 1: msgrcv(0x0, 0x0, 0xfd, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/6}, 0xe, 0x3, 0x1000) msgctl$IPC_RMID(0x0, 0x0) 19:22:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 610.891742][T29207] new mount options do not match the existing superblock, will be ignored 19:22:37 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 611.143279][T29223] new mount options do not match the existing superblock, will be ignored [ 611.272773][T29227] serio: Serial port pts0 19:22:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8, @loopback, 0x80}, {0xa, 0x0, 0x0, @empty}, r2, 0x4}}, 0x48) 19:22:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000180)=0xdab, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:22:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:38 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:38 executing program 5: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) unshare(0x2a000400) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 19:22:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1d}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) [ 611.768193][T29253] new mount options do not match the existing superblock, will be ignored 19:22:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000b00)=ANY=[], 0x478) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) shutdown(0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 19:22:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r2}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e20, 0x10000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r3}}, 0x48) 19:22:38 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x8c982) r1 = memfd_create(&(0x7f0000000440)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9l^i\xda\x1cxo-\x89I\xd3\x04$\x7f\xbe[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100007e00) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80080, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x2, 0x977, 0xffffffffffffffff, 0x2}) [ 612.086311][T29272] new mount options do not match the existing superblock, will be ignored 19:22:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:40 executing program 2: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003a80)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000180)=""/169, 0xa9}, {&(0x7f0000000240)=""/66, 0x42}, {&(0x7f00000002c0)}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000300)=""/207, 0xcf}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/89, 0x59}], 0x7, &(0x7f00000005c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x60}}, {{&(0x7f0000000640)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/122, 0x7a}, {&(0x7f0000001a00)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)=""/221, 0xdd}, {&(0x7f0000000880)=""/129, 0x81}, {&(0x7f0000002a00)=""/233, 0xe9}, {&(0x7f0000002b00)=""/237, 0xed}, {&(0x7f0000002c00)=""/216, 0xd8}], 0x5, &(0x7f0000002d00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000002dc0)=@abs, 0x6e, &(0x7f0000003000)=[{&(0x7f0000002e40)=""/111, 0x6f}, {&(0x7f0000002ec0)=""/4, 0x4}, {&(0x7f0000002f00)=""/214, 0xd6}], 0x3, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f00000030c0)=@abs, 0x6e, &(0x7f0000003200)=[{&(0x7f0000003140)=""/187, 0xbb}], 0x1, &(0x7f0000003240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f00000032c0)=""/181, 0xb5}, {&(0x7f0000003380)=""/222, 0xde}, {&(0x7f0000003480)=""/164, 0xa4}], 0x3, &(0x7f0000003580)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000035c0)=@abs, 0x6e, &(0x7f0000003940)=[{&(0x7f0000003640)=""/246, 0xf6}, {&(0x7f0000003740)=""/49, 0x31}, {&(0x7f0000003780)=""/205, 0xcd}, {&(0x7f0000003880)=""/126, 0x7e}, {&(0x7f0000003900)=""/20, 0x14}], 0x5, &(0x7f00000039c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}], 0x7, 0x40000030, &(0x7f0000003c40)) io_uring_setup(0x1fa5, &(0x7f0000003c80)={0x0, 0x8968, 0x4, 0x2, 0x212, 0x0, r0}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) io_uring_setup(0x7e0a, &(0x7f0000003d40)={0x0, 0x11d1, 0x10, 0x0, 0x14b}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x100, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000003d00)=r1, 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r3}}, 0x48) 19:22:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:40 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:40 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0xfffe, 0x1, 0xffffffff, 0x400000000000}) 19:22:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/124}], 0x2, 0x0, 0x0) 19:22:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 613.582924][T29290] new mount options do not match the existing superblock, will be ignored [ 613.588597][T29297] debugfs: File 'dropped' in directory 'loop0' already present! [ 613.601998][T29297] debugfs: File 'msg' in directory 'loop0' already present! 19:22:40 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0xfffe, 0x1, 0xffffffff, 0x400000000000}) 19:22:40 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x200400, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setpriority(0x2, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x800, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000340)={0x68, 0x29, 0x1, {0x0, [{{0x1, 0x0, 0x7}, 0xffffffff00000000, 0x9, 0x7, './file0'}, {{0x40, 0x2, 0x4}, 0x80000000, 0x7b, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0x400, 0x3f, 0x7, './file0'}]}}, 0x68) pwritev(r1, &(0x7f00000023c0)=[{&(0x7f0000000240)="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", 0xff}], 0x1, 0x8001, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0), 0xc7) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) 19:22:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff2a, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x80000000, @remote, 0x3}, {0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, '\x00', 0xf}, 0xffffffff}, r1, 0x4}}, 0x48) [ 613.774424][T29305] debugfs: File 'dropped' in directory 'loop0' already present! [ 613.774791][T29307] new mount options do not match the existing superblock, will be ignored [ 613.806973][T29305] debugfs: File 'msg' in directory 'loop0' already present! 19:22:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast2}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}, {0xa, 0x4e24, 0x3, @private1, 0x3}, r4, 0xd0}}, 0x48) 19:22:41 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:41 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0xfffe, 0x1, 0xffffffff, 0x400000000000}) 19:22:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:41 executing program 1: openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/124}], 0x2, 0x0, 0x0) 19:22:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:41 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={'\x00', 0xfffe, 0x1, 0xffffffff, 0x400000000000}) [ 614.829169][T29342] debugfs: File 'dropped' in directory 'loop0' already present! [ 614.838663][T29342] debugfs: File 'msg' in directory 'loop0' already present! [ 614.861270][T29344] new mount options do not match the existing superblock, will be ignored 19:22:41 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8006}, 0x4) 19:22:41 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='fdb_delete\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)=':\xbc^&*:8^@\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x2e, 0x8}}, 0x20) [ 614.948381][T29351] debugfs: File 'dropped' in directory 'loop0' already present! [ 614.966564][T29351] debugfs: File 'msg' in directory 'loop0' already present! 19:22:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) [ 615.031779][T29354] new mount options do not match the existing superblock, will be ignored [ 615.145468][T29366] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 19:22:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)=0x2) read(0xffffffffffffffff, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./bus\x00') 19:22:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000002540)=[{{&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @empty}}}], 0x20, 0x800300}}], 0x1, 0x0) 19:22:42 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) 19:22:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x160, 0xffffffff, 0xffffffff, 0x160, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}}}}, {{@uncond, 0x0, 0xa0, 0xc0, 0x0, {}, [@common=@addrtype={{0x30}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x57) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0xb2fe3cf3}, 0x14) r3 = socket(0x26, 0x3, 0x3) sendmsg$inet(r3, &(0x7f00000009c0)={&(0x7f00000002c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000300)="fb34bd5f91b985c14d43c6c256e62948cbf138f605882cf6dbf72ba33d502a56df41fc9f21bb686f7675650026f7e1780aff51e599cd06694e25751aad23aeed12be8f3d0085cd7bf61339dc105ddf6014ee8e1e0ab2a95f3bdc9af6733115f2f26875d1efb98809b2347ae52b380a2df796452f418eae15d09e293f9591d1b548a745ce895636ad3f298e6fe7921d75090a49ff81debae1d76e5f", 0x9b}, {&(0x7f0000000680)="dc2b6301960a74f48989dde793b16b620d4f24bb00fa4a5ed96acfe75ca5767ef92a98f46fa2042ab983849f93bb127aecd60f6c45bb441dfa829e2f192354603ee45c3d70a61cda17724270d10ffbfbf486284f42c1b38b79dec3421a9146da2146450308f2", 0x66}, {&(0x7f0000000700)="f7ae531d5b76b5c53fd11c2c1b623e7ce25abb37c4284cf6e10c479bb986ea737cbf20fa8ec174ad7bc81dc281ac918a8bd054e298501eeef0abb8b320f6d9c41a0812ccce7ce6d2fb689c0f0efba72630532510a128c13d3b851ef5d1908714aba6ac25f24ba40da53bc1b37155d7ec62a934d7ff6f11d23e37388e5311f2ebe35cfa568ca0485ada9b2d88dcc9c5108089f1f498fcffad4c454a144fb7c98466c1a3ecf054b938f55df5acd1e7cfda22cc6a233abb85ea84210695d905275a18", 0xc1}, {&(0x7f0000000800)="382ddf556420757173f673267e040dcd48a579de20f28c4fcff2c2f548fb41f4199013500973e86376c54640fde4847652e798df25a98ea8ece3689216bcb8b899af274845ee32d336fea0bce6a995777937979a620aa329f67a7a93cb2de174100cf94cd3504978cfebc36bbc3d7aee984d7035d0dad58755698930b5b9a19afadbf66f3d4d09dfcec07d3ec97f0f1054ee8b82cd2f25fca1c880687473", 0x9e}, {&(0x7f00000008c0)="875109082cbe15fb59bd7defa3d150634375fbede63860d42dbe4662d80f35fdf7518adc3e881e2721185c3a09d21403af4e366d992a6b886196400793c2cd05f5db5fc13bd4681f026028bf425b9a5f226aac2b5dd2c79b8a70d88d57474f4e72c5b3e21b66", 0x66}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)="1de47835e2b4f4e803e1a989f24abcd362fe185e2e17a852e1395dd5d860b72441853d5089f3246da9ce505e6e1375fc32fb4604c9704bdda911c0f095a90235ad2c0e89e99442f75e201c963be0e267f4f7d433e0d5fd3db44156fbba198274ec1c9c6b8709b4cb53ea5c415ee04563c32fabdd10b37e32164fc8789ce5cd3a3c109d6012d7f0f1c30aa9b90c66b74916b7bba7861be6413695f1a91500e633644dd6a091e982499e09a939672f88c7932ca364f5c73216e5e030a5f9a6160bcf6c684ee6042f0fe8ec10441d7376", 0xcf}], 0x8, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010100, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}], 0x38}, 0x40) sendfile(r1, r0, 0x0, 0x4000000000edb9) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 19:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x640800, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {r1, 0xab52, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x6, {"d50000001100e20500"}, 0x8, 0x1800000, 0x8}, @in6={0xa, 0x4e21, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x118) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000280)={0xffffffff, 0xff, 0x1, 0xffff, 0x7, [{0x6, 0x1, 0x8fe, '\x00', 0x1000}, {0xfffffffffffffffe, 0x2, 0x3, '\x00', 0x4}, {0x19, 0x3, 0x8, '\x00', 0x2302}, {0x47, 0x5, 0x2, '\x00', 0x1}, {0x7ff, 0x5, 0x9, '\x00', 0x2005}, {0x4, 0x294, 0x100}, {0xfffffffffffffff9, 0x6, 0x3, '\x00', 0x97746c695bdb07b2}]}) [ 616.216552][T29385] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 616.241649][T29387] new mount options do not match the existing superblock, will be ignored 19:22:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:42 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000b00)=ANY=[], 0x478) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 616.344473][T29394] x_tables: duplicate underflow at hook 3 [ 616.366221][T29397] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 616.376418][T29394] x_tables: duplicate underflow at hook 3 19:22:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001bc0)=""/4091, 0xffb}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) [ 616.463479][T29403] new mount options do not match the existing superblock, will be ignored 19:22:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8000000000001ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000e98a6f2b00"}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000200)=0x2) read(0xffffffffffffffff, 0x0, 0x2000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 19:22:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x5, @private0, 0x10001}, {0xa, 0x4e20, 0x81, @rand_addr=' \x01\x00', 0x2ae2}, 0xffffffffffffffff, 0x4}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r2}}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) dup3(r0, r3, 0x0) 19:22:43 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) 19:22:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x200400, 0x1) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setpriority(0x2, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x800, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000340)={0x68, 0x29, 0x1, {0x0, [{{0x1, 0x0, 0x7}, 0xffffffff00000000, 0x9, 0x7, './file0'}, {{0x40, 0x2, 0x4}, 0x80000000, 0x7b, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0x400, 0x3f, 0x7, './file0'}]}}, 0x68) pwritev(r1, &(0x7f00000023c0)=[{&(0x7f0000000240)="638eee115065e7553f7125b6bbdc2ba357e9ad6007f4800a45952da3cdd340af9331dc372b4c72709fc2e394443e1af822a62d6e9bb93f710b8b8b3eb8714339e7e97500d82c014d55e0d2d28f585e92c2c052d93edb571eb8f1d5981bfb241be085c3a1bf1aef68cbf6c83759abe4529f3e53a7795c93aa28ac72c3294074714b93b75bdf619ece441d33e6d7fc1f7edea2be5e8366a9347a2b62f0a3b5bc851247a21e933b1ba02a9fe031c92a05bd78d98a0754fec8dadaa86c6aadc0b7b9e78c21c1689641e214a43e11a407117148346f661f28179dcb6f69d58abcb689c7af7e5d15ae92dc92b63ecd36110e6a2ba15cb0129863b99f679405e41e0b", 0xff}], 0x1, 0x8001, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x40cc805, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0), 0xc7) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) 19:22:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) close(r0) [ 616.805465][T29428] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 616.829297][T29429] new mount options do not match the existing superblock, will be ignored 19:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x5c98, @mcast2, 0xfffffffd}, {0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, '\x00', 0x25}, 0x7}, r1, 0x1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) 19:22:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00, 0x0, 0x4}}}, 0x78) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x5) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 19:22:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:43 executing program 0: clone(0x20002006ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1ffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000540)=""/159, 0x9f}], 0x1, 0x0, 0x0) [ 616.967924][T29437] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 617.008018][T29439] ------------[ cut here ]------------ 19:22:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872dd436dc9200", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40001}, 0x4000) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x348) 19:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) write(r0, &(0x7f0000000200)="24907b113d1404d3a6ef06b1d32fb428ee42744f1832c2cb4ed528e4bc61dfd812e13a12280f477620326dd41598c2694cc4abed96f7b2c64ae0feb21cb5f44f5b156d72625d2ce51428bec3d589cf60b80b9640d7c16cfd66", 0x59) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x8000, 0x7, {"e7871f6c441e48bd81d3c02d4f16ea66"}, 0x6, 0xdc, 0x100}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) [ 617.022237][T29439] WARNING: CPU: 1 PID: 29439 at arch/x86/entry/vsyscall/vsyscall_64.c:276 emulate_vsyscall+0x317/0xc00 [ 617.056886][T29439] Modules linked in: [ 617.067749][T29439] CPU: 1 PID: 29439 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 617.069860][T29444] new mount options do not match the existing superblock, will be ignored [ 617.097812][T29439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.116815][T29448] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 617.134106][T29439] RIP: 0010:emulate_vsyscall+0x317/0xc00 [ 617.147216][T29439] Code: 84 01 00 00 e8 ca a1 75 00 48 c1 eb 0a 31 ff 41 bc 01 00 00 00 f7 d3 83 e3 01 89 de e8 f2 a8 75 00 85 db 74 0f e8 a9 a1 75 00 <0f> 0b e9 48 01 00 00 45 31 e4 e8 9a a1 75 00 44 89 e0 48 83 c4 38 [ 617.190513][T29439] RSP: 0000:ffffc90004b2fe48 EFLAGS: 00010216 [ 617.196785][T29439] RAX: 00000000000001ee RBX: 0000000000000001 RCX: ffffc90014349000 [ 617.207425][T29439] RDX: 0000000000040000 RSI: ffffffff81006a37 RDI: 0000000000000003 [ 617.216837][T29439] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 617.226531][T29439] R10: ffffffff81006a2e R11: 0000000000000000 R12: 0000000000000001 [ 617.235339][T29439] R13: ffffc90004b2ffd8 R14: ffffc90004b2fff0 R15: 0000000000000000 [ 617.244135][T29439] FS: 00007f9d3a0a1700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 617.255205][T29439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 617.262704][T29439] CR2: 00007fc850174000 CR3: 00000000856e2000 CR4: 0000000000350ee0 [ 617.275828][T29439] Call Trace: [ 617.279189][T29439] do_user_addr_fault+0x8f5/0x11c0 [ 617.287726][T29439] exc_page_fault+0x9e/0x180 [ 617.299256][T29439] ? asm_exc_page_fault+0x8/0x30 [ 617.308223][T29439] asm_exc_page_fault+0x1e/0x30 [ 617.318441][T29439] RIP: 0033:_end+0x6edda000/0x0 [ 617.328589][T29439] Code: Unable to access opcode bytes at RIP 0xffffffffff5fffd6. [ 617.345525][T29439] RSP: 002b:00007f9d3a0a1188 EFLAGS: 00010246 [ 617.353648][T29439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 617.369337][T29439] RDX: ffffffff00000000 RSI: 000000000000ee00 RDI: 0000000000000004 [ 617.379582][T29439] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 617.394221][T29439] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 617.407663][T29439] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000078 [ 617.417599][T29439] Kernel panic - not syncing: panic_on_warn set ... [ 617.424183][T29439] CPU: 1 PID: 29439 Comm: syz-executor.5 Not tainted 5.15.0-rc1-syzkaller #0 [ 617.432940][T29439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.442987][T29439] Call Trace: [ 617.446259][T29439] dump_stack_lvl+0xcd/0x134 [ 617.450856][T29439] panic+0x2b0/0x6dd [ 617.454749][T29439] ? __warn_printk+0xf3/0xf3 [ 617.459346][T29439] ? __warn.cold+0x1a/0x44 [ 617.463763][T29439] ? emulate_vsyscall+0x317/0xc00 [ 617.468793][T29439] __warn.cold+0x35/0x44 [ 617.473038][T29439] ? emulate_vsyscall+0x317/0xc00 [ 617.478071][T29439] report_bug+0x1bd/0x210 [ 617.482702][T29439] handle_bug+0x3c/0x60 [ 617.486867][T29439] exc_invalid_op+0x14/0x40 [ 617.491377][T29439] asm_exc_invalid_op+0x12/0x20 [ 617.496232][T29439] RIP: 0010:emulate_vsyscall+0x317/0xc00 [ 617.501870][T29439] Code: 84 01 00 00 e8 ca a1 75 00 48 c1 eb 0a 31 ff 41 bc 01 00 00 00 f7 d3 83 e3 01 89 de e8 f2 a8 75 00 85 db 74 0f e8 a9 a1 75 00 <0f> 0b e9 48 01 00 00 45 31 e4 e8 9a a1 75 00 44 89 e0 48 83 c4 38 [ 617.521568][T29439] RSP: 0000:ffffc90004b2fe48 EFLAGS: 00010216 [ 617.527637][T29439] RAX: 00000000000001ee RBX: 0000000000000001 RCX: ffffc90014349000 [ 617.535604][T29439] RDX: 0000000000040000 RSI: ffffffff81006a37 RDI: 0000000000000003 [ 617.543571][T29439] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 617.551537][T29439] R10: ffffffff81006a2e R11: 0000000000000000 R12: 0000000000000001 [ 617.559508][T29439] R13: ffffc90004b2ffd8 R14: ffffc90004b2fff0 R15: 0000000000000000 [ 617.567483][T29439] ? emulate_vsyscall+0x30e/0xc00 [ 617.572518][T29439] ? emulate_vsyscall+0x317/0xc00 [ 617.577553][T29439] ? emulate_vsyscall+0x317/0xc00 [ 617.582592][T29439] do_user_addr_fault+0x8f5/0x11c0 [ 617.587717][T29439] exc_page_fault+0x9e/0x180 [ 617.592308][T29439] ? asm_exc_page_fault+0x8/0x30 [ 617.597249][T29439] asm_exc_page_fault+0x1e/0x30 [ 617.602102][T29439] RIP: 0033:_end+0x6edda000/0x0 [ 617.606959][T29439] Code: Unable to access opcode bytes at RIP 0xffffffffff5fffd6. [ 617.614676][T29439] RSP: 002b:00007f9d3a0a1188 EFLAGS: 00010246 [ 617.620736][T29439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 617.628706][T29439] RDX: ffffffff00000000 RSI: 000000000000ee00 RDI: 0000000000000004 [ 617.636676][T29439] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 617.644644][T29439] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 617.652607][T29439] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000078 [ 617.661538][T29439] Kernel Offset: disabled [ 617.665850][T29439] Rebooting in 86400 seconds..