R11: 0000000000000293 R12: 00000000002236e2 [ 2242.231064][T13219] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 00000000002233a1 [ 2242.239046][T13219] [ 2242.242310][T13219] memory: usage 307200kB, limit 307200kB, failcnt 17258 [ 2242.249414][T13219] memory+swap: usage 307544kB, limit 9007199254740988kB, failcnt 0 [ 2242.257371][T13219] kmem: usage 307172kB, limit 9007199254740988kB, failcnt 0 [ 2242.264843][T13219] Memory cgroup stats for /syz1: [ 2242.269209][T13219] cache 8192 [ 2242.277755][T13219] rss 8192 [ 2242.280922][T13219] shmem 0 [ 2242.283892][T13219] mapped_file 0 [ 2242.287450][T13219] dirty 8192 [ 2242.290675][T13219] writeback 8192 [ 2242.294361][T13219] workingset_refault_anon 217 [ 2242.299204][T13219] workingset_refault_file 1 [ 2242.303796][T13219] swap 352256 [ 2242.307179][T13219] swapcached 20480 [ 2242.311025][T13219] pgpgin 1656799 [ 2242.314636][T13219] pgpgout 1656792 [ 2242.318422][T13219] pgfault 1273849 [ 2242.322200][T13219] pgmajfault 79 [ 2242.325761][T13219] inactive_anon 0 [ 2242.329599][T13219] active_anon 0 [ 2242.333137][T13219] inactive_file 0 [ 2242.336838][T13219] active_file 8192 [ 2242.340652][T13219] unevictable 0 [ 2242.344181][T13219] hierarchical_memory_limit 314572800 [ 2242.349814][T13219] hierarchical_memsw_limit 9223372036854771712 [ 2242.356205][T13219] total_cache 8192 [ 2242.360056][T13219] total_rss 8192 [ 2242.363632][T13219] total_shmem 0 [ 2242.367178][T13219] total_mapped_file 0 [ 2242.371166][T13219] total_dirty 8192 [ 2242.374965][T13219] total_writeback 8192 [ 2242.379117][T13219] total_workingset_refault_anon 217 [ 2242.384415][T13219] total_workingset_refault_file 1 [ 2242.389565][T13219] total_swap 352256 [ 2242.393367][T13219] total_swapcached 20480 [ 2242.397623][T13219] total_pgpgin 1656799 [ 2242.401710][T13219] total_pgpgout 1656792 [ 2242.405903][T13219] total_pgfault 1273849 [ 2242.410078][T13219] total_pgmajfault 79 [ 2242.414108][T13219] total_inactive_anon 0 [ 2242.418284][T13219] total_active_anon 0 [ 2242.422269][T13219] total_inactive_file 0 [ 2242.426454][T13219] total_active_file 8192 [ 2242.430719][T13219] total_unevictable 0 [ 2242.434738][T13219] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13219,uid=0 [ 2242.450522][T13219] Memory cgroup out of memory: Killed process 13219 (syz-executor.1) total-vm:46440kB, anon-rss:508kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:22 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x42, 0x4, 0x3, 0x18, 0x108, 0x64, 0x0, 0x4, 0x4, 0x0, @private=0xa010101, @empty, {[@cipso={0x86, 0x26, 0x0, [{0x5, 0xc, "63936fe665344e8df5fb"}, {0x1, 0x4, "184b"}, {0x5, 0x10, "514c3e538741a4a6e87310b9c196"}]}, @rr={0x7, 0xf, 0x4d, [@remote, @multicast1, @multicast1]}, @timestamp_addr={0x44, 0x3c, 0xc8, 0x1, 0x5, [{@dev={0xac, 0x14, 0x14, 0x36}, 0x10000}, {@multicast1, 0xc5}, {@rand_addr=0x64010100, 0x400}, {@private=0xa010100, 0x5}, {@loopback, 0x5fe}, {@remote, 0x9}, {@dev={0xac, 0x14, 0x14, 0x3f}, 0x7}]}, @cipso={0x86, 0x7b, 0x3, [{0x6, 0x6, "390d178b"}, {0x2, 0x2}, {0x0, 0x12, "fc02f0e62560ffb39bb8913afb9ab04e"}, {0x6, 0x12, "ece3e0483d79d322a4a5f90b2cbcf108"}, {0x1, 0x10, "0249f28f51207edef3d0fa40ef26"}, {0x2, 0xb, "8dd6b90fb20d720add"}, {0x0, 0x7, "896b576231"}, {0x1, 0x12, "b5e2a41b03d7b93b87863404343a2683"}, {0x2, 0x7, "64b6ec2695"}, {0x7, 0xe, "f7b91b16d73eb67357df2266"}]}, @timestamp={0x44, 0x8, 0x31, 0x0, 0x4, [0xd09]}]}}}}}) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) pipe2$watch_queue(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) setsockopt$inet_MCAST_LEAVE_GROUP(r10, 0x0, 0x2d, &(0x7f0000000680)={0x2, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)=r0}, 0x20) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r0, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_tracing={0x1a, 0x3, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x0, 0x2, 0xb, 0xa, 0x100, 0x8}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], &(0x7f0000000200)='GPL\x00', 0x5, 0xf6, &(0x7f0000000240)=""/246, 0x41100, 0x1, '\x00', r1, 0x1c, r2, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x3dd4, r0, 0x7, &(0x7f00000005c0)=[r5, r6, r9, r12, 0x1, r13, 0x1, r14, r15], &(0x7f0000000600)=[{0x3, 0x1, 0xa, 0x9}, {0x1, 0x2, 0x10, 0x3}, {0x4, 0x2, 0xc, 0xc}, {0x4, 0x5, 0x0, 0xb}, {0x3, 0x4, 0x3, 0x1}, {0x2, 0x1, 0x5, 0xa}, {0x3, 0x3, 0xa, 0xb}]}, 0x90) 12:14:23 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x202) (async) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x202) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) (async) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) 12:14:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x8000, 0x8, 0x1, 0x5f, {{0xe, 0x4, 0x0, 0x7, 0x38, 0x66, 0x0, 0x79, 0x2f, 0x0, @local, @multicast1, {[@lsrr={0x83, 0x23, 0xbb, [@local, @multicast1, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x26}]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380), 0x80) 12:14:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004000c) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:23 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)=""/200, &(0x7f0000000100)=0xc8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18006a3100000000000000f78a00ffffffff9500000020000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffbff, '\x00', 0x0, r3, 0x4, 0x1, 0x5}, 0x48) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x2, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r1, 0x7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x1, 0x6, 0x65, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, 0x8028, 0x1, 0x2b, 0xffffffa7}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x20, 0x1, 0x6, 0x5, {{0x22, 0x4, 0x2, 0x14, 0x88, 0x67, 0x0, 0x8, 0x4, 0x0, @empty, @broadcast, {[@generic={0x0, 0x9, "617d0935d262d0"}, @timestamp_addr={0x44, 0xc, 0xde, 0x1, 0x0, [{@loopback, 0x7fff}]}, @generic={0x86, 0x4, "b439"}, @noop, @ssrr={0x89, 0x2b, 0xb0, [@rand_addr=0x64010101, @remote, @rand_addr=0x64010101, @loopback, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @dev={0xac, 0x14, 0x14, 0xb}, @private=0xa010101]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x5d, 0x3, 0x9, [{@rand_addr=0x64010100, 0x1}, {@broadcast, 0x9}, {@dev={0xac, 0x14, 0x14, 0x22}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x19}, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x1}]}]}}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="73697430000000000000000000000000dccde0d15864b4930b7dbc3b05e91592689bd2a7f4ad9196d696097a5bd396536f34923329b4deec4e6904a455c6edfbc98ab0f711e77fef05748732e6de27aaf85e66ff8589fc67215051234cb1542d6baf4cafe66c715d5412df4d48a9667d085c5c16bdd62dc189c228f52ba5e47b1d3db1", @ANYRES32=r2, @ANYBLOB="800000010000000500000fff4867006000670000810490780a0101000a01010094040100443cce810a01010200000008ac1414aa00000007ac1414bb00000009e0000002fffffffee00000010000003e640101010000ffffffffffff0000000001890b29eba270d4c6158b9d"]}) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004000c) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:23 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)=""/200, &(0x7f0000000100)=0xc8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18006a3100000000000000f78a00ffffffff9500000020000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffbff, '\x00', 0x0, r3, 0x4, 0x1, 0x5}, 0x48) socket$inet_dccp(0x2, 0x6, 0x0) (async) getsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)=""/200, &(0x7f0000000100)=0xc8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18006a3100000000000000f78a00ffffffff9500000020000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffbff, '\x00', 0x0, r3, 0x4, 0x1, 0x5}, 0x48) (async) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x2, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r1, 0x7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x1, 0x6, 0x65, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, 0x8028, 0x1, 0x2b, 0xffffffa7}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x20, 0x1, 0x6, 0x5, {{0x22, 0x4, 0x2, 0x14, 0x88, 0x67, 0x0, 0x8, 0x4, 0x0, @empty, @broadcast, {[@generic={0x0, 0x9, "617d0935d262d0"}, @timestamp_addr={0x44, 0xc, 0xde, 0x1, 0x0, [{@loopback, 0x7fff}]}, @generic={0x86, 0x4, "b439"}, @noop, @ssrr={0x89, 0x2b, 0xb0, [@rand_addr=0x64010101, @remote, @rand_addr=0x64010101, @loopback, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @dev={0xac, 0x14, 0x14, 0xb}, @private=0xa010101]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x5d, 0x3, 0x9, [{@rand_addr=0x64010100, 0x1}, {@broadcast, 0x9}, {@dev={0xac, 0x14, 0x14, 0x22}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x19}, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x1}]}]}}}}}) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="73697430000000000000000000000000dccde0d15864b4930b7dbc3b05e91592689bd2a7f4ad9196d696097a5bd396536f34923329b4deec4e6904a455c6edfbc98ab0f711e77fef05748732e6de27aaf85e66ff8589fc67215051234cb1542d6baf4cafe66c715d5412df4d48a9667d085c5c16bdd62dc189c228f52ba5e47b1d3db1", @ANYRES32=r2, @ANYBLOB="800000010000000500000fff4867006000670000810490780a0101000a01010094040100443cce810a01010200000008ac1414aa00000007ac1414bb00000009e0000002fffffffee00000010000003e640101010000ffffffffffff0000000001890b29eba270d4c6158b9d"]}) 12:14:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004000c) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x2004000c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:23 executing program 5: socket$inet_dccp(0x2, 0x6, 0x0) (async) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000000)=""/200, &(0x7f0000000100)=0xc8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18006a3100000000000000f78a00ffffffff9500000020000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffbff, '\x00', 0x0, r3, 0x4, 0x1, 0x5}, 0x48) 12:14:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x2}, 0x8) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x2, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r1, 0x7}, 0xc) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r1, 0x7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x1, 0x6, 0x65, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, 0x8028, 0x1, 0x2b, 0xffffffa7}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x20, 0x1, 0x6, 0x5, {{0x22, 0x4, 0x2, 0x14, 0x88, 0x67, 0x0, 0x8, 0x4, 0x0, @empty, @broadcast, {[@generic={0x0, 0x9, "617d0935d262d0"}, @timestamp_addr={0x44, 0xc, 0xde, 0x1, 0x0, [{@loopback, 0x7fff}]}, @generic={0x86, 0x4, "b439"}, @noop, @ssrr={0x89, 0x2b, 0xb0, [@rand_addr=0x64010101, @remote, @rand_addr=0x64010101, @loopback, @loopback, @broadcast, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @dev={0xac, 0x14, 0x14, 0xb}, @private=0xa010101]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x5d, 0x3, 0x9, [{@rand_addr=0x64010100, 0x1}, {@broadcast, 0x9}, {@dev={0xac, 0x14, 0x14, 0x22}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x19}, 0x80000000}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x1}]}]}}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="73697430000000000000000000000000dccde0d15864b4930b7dbc3b05e91592689bd2a7f4ad9196d696097a5bd396536f34923329b4deec4e6904a455c6edfbc98ab0f711e77fef05748732e6de27aaf85e66ff8589fc67215051234cb1542d6baf4cafe66c715d5412df4d48a9667d085c5c16bdd62dc189c228f52ba5e47b1d3db1", @ANYRES32=r2, @ANYBLOB="800000010000000500000fff4867006000670000810490780a0101000a01010094040100443cce810a01010200000008ac1414aa00000007ac1414bb00000009e0000002fffffffee00000010000003e640101010000ffffffffffff0000000001890b29eba270d4c6158b9d"]}) 12:14:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x40, 0x8, 0x6, 0x4, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010102, {[@noop, @timestamp={0x44, 0xc, 0x52, 0x0, 0x3, [0x1f, 0x4]}, @ra={0x94, 0x4, 0x1}, @generic={0x96, 0xf, "2ecb53ea066b5c4605fdcb6764"}, @timestamp={0x44, 0x10, 0xe8, 0x0, 0x9, [0x4, 0x20, 0x5]}, @noop]}}}}}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x1c, 0x4, 0x1, 0x0, 0x70, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@noop, @noop, @lsrr={0x83, 0x27, 0x22, [@multicast1, @local, @broadcast, @multicast1, @broadcast, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x20}, @local]}, @cipso={0x86, 0x30, 0x0, [{0x2, 0xf, "955890e7a9fc21e25e887cccaf"}, {0x7, 0x3, "c3"}, {0x5, 0x10, "d13a18f8b956f93f9a7c77b9be6d"}, {0x2, 0x8, "af81f22f5531"}]}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffb828}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func]}, &(0x7f0000000100)='syzkaller\x00', 0x401, 0x0, 0x0, 0x40f00, 0x56, '\x00', r3, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x2, 0x5, 0x9}, 0x10, 0x23268, r0, 0x2, &(0x7f0000000380)=[r6, r9], &(0x7f00000003c0)=[{0x0, 0x3, 0xc, 0x9}, {0x3, 0x2, 0x6, 0x5}], 0x10, 0x80000001}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x3, 0x0, 0xff, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x10, 0x20, 0x2, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x700, 0x1, 0x9, 0x7, {{0x10, 0x4, 0x2, 0x6, 0x40, 0x65, 0x0, 0x6, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x19}, @empty, {[@timestamp_prespec={0x44, 0x2c, 0x9e, 0x3, 0x4, [{@rand_addr=0x64010100, 0x15}, {@multicast2, 0x40}, {@empty, 0x1c}, {@dev={0xac, 0x14, 0x14, 0x40}, 0x8}, {@multicast1, 0x9}]}]}}}}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xcea92c2d7e215ac8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc010}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x3, 0x0, 0xff, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x10, 0x20, 0x2, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x700, 0x1, 0x9, 0x7, {{0x10, 0x4, 0x2, 0x6, 0x40, 0x65, 0x0, 0x6, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x19}, @empty, {[@timestamp_prespec={0x44, 0x2c, 0x9e, 0x3, 0x4, [{@rand_addr=0x64010100, 0x15}, {@multicast2, 0x40}, {@empty, 0x1c}, {@dev={0xac, 0x14, 0x14, 0x40}, 0x8}, {@multicast1, 0x9}]}]}}}}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xcea92c2d7e215ac8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc010}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:23 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x40, 0x8, 0x6, 0x4, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010102, {[@noop, @timestamp={0x44, 0xc, 0x52, 0x0, 0x3, [0x1f, 0x4]}, @ra={0x94, 0x4, 0x1}, @generic={0x96, 0xf, "2ecb53ea066b5c4605fdcb6764"}, @timestamp={0x44, 0x10, 0xe8, 0x0, 0x9, [0x4, 0x20, 0x5]}, @noop]}}}}}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x1c, 0x4, 0x1, 0x0, 0x70, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@noop, @noop, @lsrr={0x83, 0x27, 0x22, [@multicast1, @local, @broadcast, @multicast1, @broadcast, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x20}, @local]}, @cipso={0x86, 0x30, 0x0, [{0x2, 0xf, "955890e7a9fc21e25e887cccaf"}, {0x7, 0x3, "c3"}, {0x5, 0x10, "d13a18f8b956f93f9a7c77b9be6d"}, {0x2, 0x8, "af81f22f5531"}]}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffb828}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func]}, &(0x7f0000000100)='syzkaller\x00', 0x401, 0x0, 0x0, 0x40f00, 0x56, '\x00', r3, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x2, 0x5, 0x9}, 0x10, 0x23268, r0, 0x2, &(0x7f0000000380)=[r6, r9], &(0x7f00000003c0)=[{0x0, 0x3, 0xc, 0x9}, {0x3, 0x2, 0x6, 0x5}], 0x10, 0x80000001}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x40, 0x8, 0x6, 0x4, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010102, {[@noop, @timestamp={0x44, 0xc, 0x52, 0x0, 0x3, [0x1f, 0x4]}, @ra={0x94, 0x4, 0x1}, @generic={0x96, 0xf, "2ecb53ea066b5c4605fdcb6764"}, @timestamp={0x44, 0x10, 0xe8, 0x0, 0x9, [0x4, 0x20, 0x5]}, @noop]}}}}}) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x1c, 0x4, 0x1, 0x0, 0x70, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@noop, @noop, @lsrr={0x83, 0x27, 0x22, [@multicast1, @local, @broadcast, @multicast1, @broadcast, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x20}, @local]}, @cipso={0x86, 0x30, 0x0, [{0x2, 0xf, "955890e7a9fc21e25e887cccaf"}, {0x7, 0x3, "c3"}, {0x5, 0x10, "d13a18f8b956f93f9a7c77b9be6d"}, {0x2, 0x8, "af81f22f5531"}]}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffb828}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func]}, &(0x7f0000000100)='syzkaller\x00', 0x401, 0x0, 0x0, 0x40f00, 0x56, '\x00', r3, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x2, 0x5, 0x9}, 0x10, 0x23268, r0, 0x2, &(0x7f0000000380)=[r6, r9], &(0x7f00000003c0)=[{0x0, 0x3, 0xc, 0x9}, {0x3, 0x2, 0x6, 0x5}], 0x10, 0x80000001}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) 12:14:23 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x3, 0x0, 0xff, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x10, 0x20, 0x2, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x700, 0x1, 0x9, 0x7, {{0x10, 0x4, 0x2, 0x6, 0x40, 0x65, 0x0, 0x6, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x19}, @empty, {[@timestamp_prespec={0x44, 0x2c, 0x9e, 0x3, 0x4, [{@rand_addr=0x64010100, 0x15}, {@multicast2, 0x40}, {@empty, 0x1c}, {@dev={0xac, 0x14, 0x14, 0x40}, 0x8}, {@multicast1, 0x9}]}]}}}}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xcea92c2d7e215ac8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc010}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x3, 0x0, 0xff, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, 0x10, 0x20, 0x2, 0x8}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x700, 0x1, 0x9, 0x7, {{0x10, 0x4, 0x2, 0x6, 0x40, 0x65, 0x0, 0x6, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x19}, @empty, {[@timestamp_prespec={0x44, 0x2c, 0x9e, 0x3, 0x4, [{@rand_addr=0x64010100, 0x15}, {@multicast2, 0x40}, {@empty, 0x1c}, {@dev={0xac, 0x14, 0x14, 0x40}, 0x8}, {@multicast1, 0x9}]}]}}}}}) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xcea92c2d7e215ac8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc010}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) 12:14:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x40, 0x8, 0x6, 0x4, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010102, {[@noop, @timestamp={0x44, 0xc, 0x52, 0x0, 0x3, [0x1f, 0x4]}, @ra={0x94, 0x4, 0x1}, @generic={0x96, 0xf, "2ecb53ea066b5c4605fdcb6764"}, @timestamp={0x44, 0x10, 0xe8, 0x0, 0x9, [0x4, 0x20, 0x5]}, @noop]}}}}}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x1c, 0x4, 0x1, 0x0, 0x70, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@noop, @noop, @lsrr={0x83, 0x27, 0x22, [@multicast1, @local, @broadcast, @multicast1, @broadcast, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x20}, @local]}, @cipso={0x86, 0x30, 0x0, [{0x2, 0xf, "955890e7a9fc21e25e887cccaf"}, {0x7, 0x3, "c3"}, {0x5, 0x10, "d13a18f8b956f93f9a7c77b9be6d"}, {0x2, 0x8, "af81f22f5531"}]}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x1c, 0x4, 0x1, 0x0, 0x70, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@noop, @noop, @lsrr={0x83, 0x27, 0x22, [@multicast1, @local, @broadcast, @multicast1, @broadcast, @private=0xa010100, @loopback, @dev={0xac, 0x14, 0x14, 0x20}, @local]}, @cipso={0x86, 0x30, 0x0, [{0x2, 0xf, "955890e7a9fc21e25e887cccaf"}, {0x7, 0x3, "c3"}, {0x5, 0x10, "d13a18f8b956f93f9a7c77b9be6d"}, {0x2, 0x8, "af81f22f5531"}]}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffb828}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x800}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_val={0x18, 0x9, 0x2, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func]}, &(0x7f0000000100)='syzkaller\x00', 0x401, 0x0, 0x0, 0x40f00, 0x56, '\x00', r3, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x2, 0x5, 0x9}, 0x10, 0x23268, r0, 0x2, &(0x7f0000000380)=[r6, r9], &(0x7f00000003c0)=[{0x0, 0x3, 0xc, 0x9}, {0x3, 0x2, 0x6, 0x5}], 0x10, 0x80000001}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:23 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) r5 = accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r8 = accept4$bt_l2cap(r5, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r8, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r7, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r11], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r9, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r11, {r12, r13}}, './file0\x00'}) r14 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r16 = getpgrp(0xffffffffffffffff) r17 = syz_clone(0x20000, &(0x7f0000000180)="7f7f9979e8ad0013f2e04fe66a075e603cc91196c64595a3c1cdf1a2c736b229a3cfa07c2479e75b", 0x28, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="4c4278110df4abfcf446cc0922b37d88d0eb0578c9aca9e549b74898c448704d39bf18a9655037062d29156e925cb20e2a1587da859d15257b56e345433dc5b477ee1b688556e40156cfaff9c70da0cfc23bfae1fb6db3a1f19af938e7e7b79f1d94911314afa1146c6ede24c9bb5a4909e16403f6a35f384416866dfaf7fb25ed0e9a5c69dbce87740e00b18980eae39cc9decae0ea70323f803fd08a9a0862dc61e3f052627e81895fbad5ade64f28d0177a6ccb0063a324f6abd95d28") shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x1, r2, r13, r14, r15, 0x8}, 0xfffffb95, 0x0, 0x8, 0x1ff, r16, r17}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:23 executing program 0: r0 = syz_clone(0xe9a9bb331fa097c1, 0x0, 0xffffffffffffff6d, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x80, 0xac, 0x3ff, 0x20, @remote, @private0, 0x0, 0x700, 0x8, 0xf2}}) arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0x10) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_newaddr={0x58, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x40, 0x0, 0xff, r2}, [@IFA_FLAGS={0x8, 0x8, 0x1d0}, @IFA_RT_PRIORITY={0x8, 0x9, 0x7ffd}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffd, 0x2, 0x6, 0x7}}, @IFA_FLAGS={0x8, 0x8, 0x20}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000080}, 0x4045) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)={0xd18, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0x8000}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x7}, 0x8) 12:14:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x8000, 0x8, 0x1, 0x5f, {{0xe, 0x4, 0x0, 0x7, 0x38, 0x66, 0x0, 0x79, 0x2f, 0x0, @local, @multicast1, {[@lsrr={0x83, 0x23, 0xbb, [@local, @multicast1, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0x26}]}]}}}}}) 12:14:24 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) (async) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) (async, rerun: 32) r5 = accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (rerun: 32) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r8 = accept4$bt_l2cap(r5, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r8, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r7, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r11], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) (async, rerun: 32) write$selinux_attr(r9, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) (async) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r11, {r12, r13}}, './file0\x00'}) (async) r14 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) r16 = getpgrp(0xffffffffffffffff) r17 = syz_clone(0x20000, &(0x7f0000000180)="7f7f9979e8ad0013f2e04fe66a075e603cc91196c64595a3c1cdf1a2c736b229a3cfa07c2479e75b", 0x28, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="4c4278110df4abfcf446cc0922b37d88d0eb0578c9aca9e549b74898c448704d39bf18a9655037062d29156e925cb20e2a1587da859d15257b56e345433dc5b477ee1b688556e40156cfaff9c70da0cfc23bfae1fb6db3a1f19af938e7e7b79f1d94911314afa1146c6ede24c9bb5a4909e16403f6a35f384416866dfaf7fb25ed0e9a5c69dbce87740e00b18980eae39cc9decae0ea70323f803fd08a9a0862dc61e3f052627e81895fbad5ade64f28d0177a6ccb0063a324f6abd95d28") shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x1, r2, r13, r14, r15, 0x8}, 0xfffffb95, 0x0, 0x8, 0x1ff, r16, r17}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:24 executing program 0: r0 = syz_clone(0xe9a9bb331fa097c1, 0x0, 0xffffffffffffff6d, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x80, 0xac, 0x3ff, 0x20, @remote, @private0, 0x0, 0x700, 0x8, 0xf2}}) arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0x10) (async, rerun: 32) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_newaddr={0x58, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x40, 0x0, 0xff, r2}, [@IFA_FLAGS={0x8, 0x8, 0x1d0}, @IFA_RT_PRIORITY={0x8, 0x9, 0x7ffd}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffd, 0x2, 0x6, 0x7}}, @IFA_FLAGS={0x8, 0x8, 0x20}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000080}, 0x4045) (rerun: 32) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)={0xd18, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0x8000}, 0xc) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x7}, 0x8) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:24 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:24 executing program 0: r0 = syz_clone(0xe9a9bb331fa097c1, 0x0, 0xffffffffffffff6d, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x80, 0xac, 0x3ff, 0x20, @remote, @private0, 0x0, 0x700, 0x8, 0xf2}}) arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0x10) (async) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_newaddr={0x58, 0x14, 0x200, 0x70bd2c, 0x25dfdbfc, {0xa, 0x40, 0x0, 0xff, r2}, [@IFA_FLAGS={0x8, 0x8, 0x1d0}, @IFA_RT_PRIORITY={0x8, 0x9, 0x7ffd}, @IFA_LOCAL={0x14, 0x2, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffd, 0x2, 0x6, 0x7}}, @IFA_FLAGS={0x8, 0x8, 0x20}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000080}, 0x4045) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)={0xd18, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0x8000}, 0xc) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x7}, 0x8) 12:14:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffe000/0x2000)=nil) (async) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) (async) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) (async) r5 = accept4$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r5, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async, rerun: 32) r6 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r8 = accept4$bt_l2cap(r5, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r8, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r7, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async, rerun: 64) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r11], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) (async) write$selinux_attr(r9, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) (async, rerun: 32) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r9, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r11, {r12, r13}}, './file0\x00'}) (async) r14 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) (async) r16 = getpgrp(0xffffffffffffffff) (async, rerun: 32) r17 = syz_clone(0x20000, &(0x7f0000000180)="7f7f9979e8ad0013f2e04fe66a075e603cc91196c64595a3c1cdf1a2c736b229a3cfa07c2479e75b", 0x28, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="4c4278110df4abfcf446cc0922b37d88d0eb0578c9aca9e549b74898c448704d39bf18a9655037062d29156e925cb20e2a1587da859d15257b56e345433dc5b477ee1b688556e40156cfaff9c70da0cfc23bfae1fb6db3a1f19af938e7e7b79f1d94911314afa1146c6ede24c9bb5a4909e16403f6a35f384416866dfaf7fb25ed0e9a5c69dbce87740e00b18980eae39cc9decae0ea70323f803fd08a9a0862dc61e3f052627e81895fbad5ade64f28d0177a6ccb0063a324f6abd95d28") (rerun: 32) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000300)={{0x1, r2, r13, r14, r15, 0x8}, 0xfffffb95, 0x0, 0x8, 0x1ff, r16, r17}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:24 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:24 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "df0052c9bf35c6dc", "a47b7ac4b8058c175d06a9b602e380af8835ba56eac82edd3bd3a145479d6dad", "99e36b2d", "ea72cc129682307c"}, 0x38) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000180)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @alu={0x4, 0x0, 0x4, 0x6, 0x6, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0x3, 0xb, 0x2, 0x4, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @exit, @cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @ldst={0x1, 0x3, 0x3, 0x7, 0x4, 0x30, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8000}], &(0x7f0000000200)='syzkaller\x00', 0x24550000, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000280)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x4, 0x0, 0x966e}, 0x10, 0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000300)=[{0x1, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000950000000000f314"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 12:14:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000180)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @alu={0x4, 0x0, 0x4, 0x6, 0x6, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0x3, 0xb, 0x2, 0x4, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @exit, @cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @ldst={0x1, 0x3, 0x3, 0x7, 0x4, 0x30, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8000}], &(0x7f0000000200)='syzkaller\x00', 0x24550000, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000280)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x4, 0x0, 0x966e}, 0x10, 0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000300)=[{0x1, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 12:14:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x48) (async) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000180)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @alu={0x4, 0x0, 0x4, 0x6, 0x6, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x1, 0x3, 0xb, 0x2, 0x4, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @exit, @cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @ldst={0x1, 0x3, 0x3, 0x7, 0x4, 0x30, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8000}], &(0x7f0000000200)='syzkaller\x00', 0x24550000, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000280)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x4, 0x0, 0x966e}, 0x10, 0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000300)=[{0x1, 0x1, 0xd, 0xb}], 0x10, 0x1}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) (async) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r2, @ANYBLOB="000000001726d7b74d30a900000000c0a0000000000005ad2400850000000c00"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) ioctl$sock_inet6_tcp_SIOCINQ(r8, 0x541b, &(0x7f00000000c0)) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x8, 0x7, 0x8, 0xfffffffffffffffc}, @printk, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xc514}, @generic={0x5, 0x2, 0x4, 0xdbc, 0x26}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r11}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r2, @ANYBLOB="000000001726d7b74d30a900000000c0a0000000000005ad2400850000000c00"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r2, @ANYBLOB="000000001726d7b74d30a900000000c0a0000000000005ad2400850000000c00"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) ioctl$sock_inet6_tcp_SIOCINQ(r8, 0x541b, &(0x7f00000000c0)) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x8, 0x7, 0x8, 0xfffffffffffffffc}, @printk, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xc514}, @generic={0x5, 0x2, 0x4, 0xdbc, 0x26}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r11}, 0x90) 12:14:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 12:14:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) 12:14:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) 12:14:25 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "df0052c9bf35c6dc", "a47b7ac4b8058c175d06a9b602e380af8835ba56eac82edd3bd3a145479d6dad", "99e36b2d", "ea72cc129682307c"}, 0x38) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "df0052c9bf35c6dc", "a47b7ac4b8058c175d06a9b602e380af8835ba56eac82edd3bd3a145479d6dad", "99e36b2d", "ea72cc129682307c"}, 0x38) (async) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r2, @ANYBLOB="000000001726d7b74d30a900000000c0a0000000000005ad2400850000000c00"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$sock_inet6_tcp_SIOCINQ(r8, 0x541b, &(0x7f00000000c0)) (async) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x8, 0x7, 0x8, 0xfffffffffffffffc}, @printk, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xc514}, @generic={0x5, 0x2, 0x4, 0xdbc, 0x26}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, @map_fd={0x18, 0x4, 0x1, 0x0, r2}], &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r11}, 0x90) 12:14:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000840)={'gre0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8, 0x10, 0x1ff, 0x1000, {{0x1a, 0x4, 0x0, 0x2b, 0x68, 0x65, 0x0, 0x3f, 0x2f, 0x0, @empty, @remote, {[@generic={0x82, 0x7, "47c13be479"}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "4b5e10f4ce41393191c7"}]}, @timestamp={0x44, 0x8, 0x7c, 0x0, 0x4, [0xc0000]}, @timestamp_prespec={0x44, 0x1c, 0xf1, 0x3, 0x5, [{@multicast1, 0x89}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x200}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x10001}]}, @timestamp_addr={0x44, 0x14, 0x8b, 0x1, 0x1, [{@private=0xa010100, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x841) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f00000006c0)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xffb, 0x6, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x71, [@remote, @broadcast, @loopback, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x3, 0x22}, @timestamp={0x44, 0x14, 0x7, 0x0, 0x6, [0x0, 0x7ff, 0xa99, 0x8]}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x9f, 0x8}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%pK \x00'}, 0x20) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20}, [@printk={@lu}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x4, 0xb, 0x6, 0x10}, @generic={0xda, 0xb, 0x5, 0x7, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x19, &(0x7f0000000100)=""/25, 0x40f00, 0x0, '\x00', r2, 0x25, r8, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xc, 0x8, 0xfff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r11, r12, r15, 0xffffffffffffffff, r16, r17, r18], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0xb}, {0x3, 0x2, 0x10, 0x7}, {0x5, 0x4, 0x1, 0x3}, {0x5, 0x3, 0x33, 0x4}], 0x10, 0x7ff}, 0x90) 12:14:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x4, 0x62, 0x1, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0xa}, 0x48) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)='%pB \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%pS \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1e, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x7}, @tail_call, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x533, 0x22, &(0x7f0000000180)=""/34, 0x40f00, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000280)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xa, 0x3, 0x914c}, 0x10, 0x1017d, 0xffffffffffffffff, 0x6, &(0x7f0000000700)=[r8, r9, r12, r15, r16, r17, r18, r19, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x7}, {0x3, 0x4, 0x6, 0x4}, {0x3, 0x2, 0x7, 0xb}, {0x2, 0x2, 0xb, 0x1}, {0x3, 0x2, 0xf, 0x6}, {0x2, 0x2, 0x0, 0x3}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000840)={'gre0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8, 0x10, 0x1ff, 0x1000, {{0x1a, 0x4, 0x0, 0x2b, 0x68, 0x65, 0x0, 0x3f, 0x2f, 0x0, @empty, @remote, {[@generic={0x82, 0x7, "47c13be479"}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "4b5e10f4ce41393191c7"}]}, @timestamp={0x44, 0x8, 0x7c, 0x0, 0x4, [0xc0000]}, @timestamp_prespec={0x44, 0x1c, 0xf1, 0x3, 0x5, [{@multicast1, 0x89}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x200}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x10001}]}, @timestamp_addr={0x44, 0x14, 0x8b, 0x1, 0x1, [{@private=0xa010100, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x841) (async) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x841) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f00000006c0)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xffb, 0x6, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x71, [@remote, @broadcast, @loopback, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x3, 0x22}, @timestamp={0x44, 0x14, 0x7, 0x0, 0x6, [0x0, 0x7ff, 0xa99, 0x8]}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x9f, 0x8}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%pK \x00'}, 0x20) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20}, [@printk={@lu}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x4, 0xb, 0x6, 0x10}, @generic={0xda, 0xb, 0x5, 0x7, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x19, &(0x7f0000000100)=""/25, 0x40f00, 0x0, '\x00', r2, 0x25, r8, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xc, 0x8, 0xfff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r11, r12, r15, 0xffffffffffffffff, r16, r17, r18], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0xb}, {0x3, 0x2, 0x10, 0x7}, {0x5, 0x4, 0x1, 0x3}, {0x5, 0x3, 0x33, 0x4}], 0x10, 0x7ff}, 0x90) 12:14:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x4, 0x62, 0x1, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0xa}, 0x48) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)='%pB \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%pS \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1e, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x7}, @tail_call, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x533, 0x22, &(0x7f0000000180)=""/34, 0x40f00, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000280)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xa, 0x3, 0x914c}, 0x10, 0x1017d, 0xffffffffffffffff, 0x6, &(0x7f0000000700)=[r8, r9, r12, r15, r16, r17, r18, r19, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x7}, {0x3, 0x4, 0x6, 0x4}, {0x3, 0x2, 0x7, 0xb}, {0x2, 0x2, 0xb, 0x1}, {0x3, 0x2, 0xf, 0x6}, {0x2, 0x2, 0x0, 0x3}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x48) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x4, 0x62, 0x1, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4, 0xa}, 0x48) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0, 0xffffffffffffffff}, &(0x7f00000004c0), &(0x7f0000000500)='%pB \x00'}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)=r0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%pS \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1e, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1}, {}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x7}, @tail_call, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x533, 0x22, &(0x7f0000000180)=""/34, 0x40f00, 0x8, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000280)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xa, 0x3, 0x914c}, 0x10, 0x1017d, 0xffffffffffffffff, 0x6, &(0x7f0000000700)=[r8, r9, r12, r15, r16, r17, r18, r19, 0xffffffffffffffff], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x7}, {0x3, 0x4, 0x6, 0x4}, {0x3, 0x2, 0x7, 0xb}, {0x2, 0x2, 0xb, 0x1}, {0x3, 0x2, 0xf, 0x6}, {0x2, 0x2, 0x0, 0x3}], 0x10, 0xfffffffa}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000840)={'gre0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x8, 0x10, 0x1ff, 0x1000, {{0x1a, 0x4, 0x0, 0x2b, 0x68, 0x65, 0x0, 0x3f, 0x2f, 0x0, @empty, @remote, {[@generic={0x82, 0x7, "47c13be479"}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "4b5e10f4ce41393191c7"}]}, @timestamp={0x44, 0x8, 0x7c, 0x0, 0x4, [0xc0000]}, @timestamp_prespec={0x44, 0x1c, 0xf1, 0x3, 0x5, [{@multicast1, 0x89}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x200}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x10001}]}, @timestamp_addr={0x44, 0x14, 0x8b, 0x1, 0x1, [{@private=0xa010100, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x841) (async) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x841) socket$inet_udp(0x2, 0x2, 0x0) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f00000006c0)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xffb, 0x6, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x71, [@remote, @broadcast, @loopback, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x3, 0x22}, @timestamp={0x44, 0x14, 0x7, 0x0, 0x6, [0x0, 0x7ff, 0xa99, 0x8]}, @end]}}}}}) accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) (async) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x9f, 0x8}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%pK \x00'}, 0x20) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20}, [@printk={@lu}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x4, 0xb, 0x6, 0x10}, @generic={0xda, 0xb, 0x5, 0x7, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x19, &(0x7f0000000100)=""/25, 0x40f00, 0x0, '\x00', r2, 0x25, r8, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xc, 0x8, 0xfff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r11, r12, r15, 0xffffffffffffffff, r16, r17, r18], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0xb}, {0x3, 0x2, 0x10, 0x7}, {0x5, 0x4, 0x1, 0x3}, {0x5, 0x3, 0x33, 0x4}], 0x10, 0x7ff}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x20}, [@printk={@lu}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x4, 0xb, 0x6, 0x10}, @generic={0xda, 0xb, 0x5, 0x7, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x19, &(0x7f0000000100)=""/25, 0x40f00, 0x0, '\x00', r2, 0x25, r8, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xc, 0x8, 0xfff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r11, r12, r15, 0xffffffffffffffff, r16, r17, r18], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0xb}, {0x3, 0x2, 0x10, 0x7}, {0x5, 0x4, 0x1, 0x3}, {0x5, 0x3, 0x33, 0x4}], 0x10, 0x7ff}, 0x90) 12:14:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x4, &(0x7f0000000840)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) r5 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x0}}, './file0\x00'}) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) r9 = gettid() r10 = syz_clone(0x20000000, &(0x7f0000000580)="8e6b709bdb2333acc1a293e8da4e598d8680250f4167d291ddc4b262ac7e3c759c2c9104b9d379f86770b57da79a330ca1622ac79a7e30bd9c7b7ff97a407e7673e3a53f252f612394f7fb93ddffbbf07a770a101cc5d3eb5f84bae2248122917a2a4d64eb2073e800dc581208061b991ec1271a3a306cf8ac64c696b1f6087547d84b7facbd1e80df6ab163e20c17a2433e4c70d57dd41cf8a12fc27e941f00b07fa4edc45f1a0801359617c2962af351825c0aee", 0xb5, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)="a8ec1b2c5f672a5d12851e5e68a0e8093d74dc9a19248a3914dcf68e1fe35c91bb713f7835426ebc5f015f22f6b40f0ebd39958e4a6399f8b0572b565b8b93c6163f3efaaf02c4d153bad96e579445744f14f566a90e7d6985cfbebd4204fe447384ca357fabb2d126b739bc9139129be42870cf9096de87cb9246378773f14f3297f748747c7bcb8b1c3604938b82674278ab341cc30d") shmctl$IPC_SET(r5, 0x1, &(0x7f0000000700)={{0x2, 0xffffffffffffffff, r6, r7, r8, 0x2, 0x64}, 0x7, 0x5, 0x7f10e3a9, 0x8, r9, r10, 0x400}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0xf5, 0x20, 0x28, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x7800, 0x40, 0x3ff, 0x10}}) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newneigh={0x50, 0x1c, 0x800, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r11, 0x2, 0x0, 0x7}, [@NDA_SRC_VNI={0x8, 0xb, 0x80000000}, @NDA_LINK_NETNSID={0x8, 0xa, 0x22f9}, @NDA_FLAGS_EXT={0x8}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0x0, 0x2, 0x6}}, @NDA_NH_ID={0x8, 0xd, 0x42}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x4004000) 12:14:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r10, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r12, 0x25, r13, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6efb}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x30, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @alu={0x7, 0x0, 0xa, 0x1, 0x2, 0x10, 0x1}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x100, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x100, 0x93, &(0x7f0000000280)=""/147, 0x41000, 0x68, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0xa, 0x81, 0xfff}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r7, r8, r0, r11, r14, r0], &(0x7f00000005c0)=[{0x2, 0x2, 0x0, 0x1}, {0x7, 0x9, 0x2, 0x4}, {0x5, 0x4, 0x8, 0xc}, {0x1, 0x4, 0x9, 0xa}, {0x0, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xf, 0x5}, {0x3, 0x5, 0xf, 0xa}, {0x2, 0x1, 0x3, 0x3}], 0x10, 0xfffffffe}, 0x90) 12:14:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r5, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r7, 0x25, r8, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x9, 0x0, 0xffffffff, 0x519, r0, 0x5, '\x00', 0x0, r1, 0x5, 0x5, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x10, 0x7800, 0x0, 0x7fffffff, {{0x15, 0x4, 0x3, 0x8, 0x54, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @rand_addr=0x64010102, {[@timestamp={0x44, 0x14, 0xe4, 0x0, 0xa, [0x8, 0x60000, 0x2, 0x5]}, @rr={0x7, 0x7, 0x54, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @lsrr={0x83, 0x23, 0xc4, [@remote, @rand_addr=0x64010102, @multicast2, @multicast2, @local, @local, @dev={0xac, 0x14, 0x14, 0x30}, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xf, &(0x7f0000000100)=""/15, 0x41000, 0x20, '\x00', r3, 0x7, r1, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x6, 0xb8f1, 0x5}, 0x10, 0x0, r0, 0x6, &(0x7f0000000380)=[r1], &(0x7f00000003c0)=[{0x1, 0x5, 0x4}, {0x1, 0x1, 0x4, 0xa}, {0x5, 0x2, 0xc, 0x10}, {0x3, 0x2, 0x9, 0xa}, {0x5, 0x5, 0xa, 0x6}, {0x5, 0x4, 0x0, 0x4}], 0x10, 0x1}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r6 = accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r9 = accept4$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r9, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @noop, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x10, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x77d, 0x0, 0x0, 0x0, 0x1a6}, {}, {}, [@generic={0x8, 0x8, 0x7, 0x23c, 0x8c30}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x7, 0xac, &(0x7f0000000c00)=""/172, 0x41000, 0x1d, '\x00', r3, 0x0, r10, 0x8, &(0x7f0000000cc0)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000d00)=[r4, r2, r4, r11, r14, r10], &(0x7f0000000d40)=[{0x1, 0x1, 0x7, 0x6}, {0x3, 0x4, 0x4, 0x6}, {0x0, 0x5, 0xc, 0x7}, {0x3, 0x2, 0xc, 0x4}, {0x0, 0x7, 0x8, 0x8}, {0x5, 0x4, 0x9}], 0x10, 0x400}, 0x90) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r8, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000840)={'syztnl1\x00', r3, 0x7, 0x80, 0x2, 0x4761, {{0x8, 0x4, 0x1, 0x7, 0x20, 0x68, 0x0, 0x54, 0x29, 0x0, @multicast1, @private=0xa010101, {[@timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x5, [{@rand_addr=0x64010101, 0x3}]}]}}}}}) r17 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='loginuid\x00') r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3e0, '\x00', r3, r1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x3e, &(0x7f00000005c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc05}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x0, 0x1, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff8d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}], &(0x7f0000000b40)='syzkaller\x00', 0x80, 0x15, &(0x7f0000000800)=""/21, 0x0, 0x10, '\x00', r16, 0x0, r17, 0x8, &(0x7f0000000900)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xa, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r1, r18, r15, r1, r2, r2, r2, r1, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x3, 0x6, 0xb}, {0x0, 0x3, 0xa, 0x7}, {0x2, 0x4, 0xb, 0x5}], 0x10, 0xfffffbff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) inotify_init() 12:14:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x4, &(0x7f0000000840)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) (async, rerun: 32) r5 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) (rerun: 32) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x0}}, './file0\x00'}) (async, rerun: 64) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) (async, rerun: 64) r9 = gettid() r10 = syz_clone(0x20000000, &(0x7f0000000580)="8e6b709bdb2333acc1a293e8da4e598d8680250f4167d291ddc4b262ac7e3c759c2c9104b9d379f86770b57da79a330ca1622ac79a7e30bd9c7b7ff97a407e7673e3a53f252f612394f7fb93ddffbbf07a770a101cc5d3eb5f84bae2248122917a2a4d64eb2073e800dc581208061b991ec1271a3a306cf8ac64c696b1f6087547d84b7facbd1e80df6ab163e20c17a2433e4c70d57dd41cf8a12fc27e941f00b07fa4edc45f1a0801359617c2962af351825c0aee", 0xb5, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)="a8ec1b2c5f672a5d12851e5e68a0e8093d74dc9a19248a3914dcf68e1fe35c91bb713f7835426ebc5f015f22f6b40f0ebd39958e4a6399f8b0572b565b8b93c6163f3efaaf02c4d153bad96e579445744f14f566a90e7d6985cfbebd4204fe447384ca357fabb2d126b739bc9139129be42870cf9096de87cb9246378773f14f3297f748747c7bcb8b1c3604938b82674278ab341cc30d") shmctl$IPC_SET(r5, 0x1, &(0x7f0000000700)={{0x2, 0xffffffffffffffff, r6, r7, r8, 0x2, 0x64}, 0x7, 0x5, 0x7f10e3a9, 0x8, r9, r10, 0x400}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0xf5, 0x20, 0x28, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x7800, 0x40, 0x3ff, 0x10}}) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newneigh={0x50, 0x1c, 0x800, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r11, 0x2, 0x0, 0x7}, [@NDA_SRC_VNI={0x8, 0xb, 0x80000000}, @NDA_LINK_NETNSID={0x8, 0xa, 0x22f9}, @NDA_FLAGS_EXT={0x8}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0x0, 0x2, 0x6}}, @NDA_NH_ID={0x8, 0xd, 0x42}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x4004000) 12:14:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r5, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r3, {0xee01}}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r7, 0x25, r8, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x9, 0x0, 0xffffffff, 0x519, r0, 0x5, '\x00', 0x0, r1, 0x5, 0x5, 0x2}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x10, 0x7800, 0x0, 0x7fffffff, {{0x15, 0x4, 0x3, 0x8, 0x54, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @rand_addr=0x64010102, {[@timestamp={0x44, 0x14, 0xe4, 0x0, 0xa, [0x8, 0x60000, 0x2, 0x5]}, @rr={0x7, 0x7, 0x54, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @lsrr={0x83, 0x23, 0xc4, [@remote, @rand_addr=0x64010102, @multicast2, @multicast2, @local, @local, @dev={0xac, 0x14, 0x14, 0x30}, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xf, &(0x7f0000000100)=""/15, 0x41000, 0x20, '\x00', r3, 0x7, r1, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x6, 0xb8f1, 0x5}, 0x10, 0x0, r0, 0x6, &(0x7f0000000380)=[r1], &(0x7f00000003c0)=[{0x1, 0x5, 0x4}, {0x1, 0x1, 0x4, 0xa}, {0x5, 0x2, 0xc, 0x10}, {0x3, 0x2, 0x9, 0xa}, {0x5, 0x5, 0xa, 0x6}, {0x5, 0x4, 0x0, 0x4}], 0x10, 0x1}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) (async) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r6 = accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r9 = accept4$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r9, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @noop, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x10, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x77d, 0x0, 0x0, 0x0, 0x1a6}, {}, {}, [@generic={0x8, 0x8, 0x7, 0x23c, 0x8c30}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x7, 0xac, &(0x7f0000000c00)=""/172, 0x41000, 0x1d, '\x00', r3, 0x0, r10, 0x8, &(0x7f0000000cc0)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000d00)=[r4, r2, r4, r11, r14, r10], &(0x7f0000000d40)=[{0x1, 0x1, 0x7, 0x6}, {0x3, 0x4, 0x4, 0x6}, {0x0, 0x5, 0xc, 0x7}, {0x3, 0x2, 0xc, 0x4}, {0x0, 0x7, 0x8, 0x8}, {0x5, 0x4, 0x9}], 0x10, 0x400}, 0x90) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r8, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000840)={'syztnl1\x00', r3, 0x7, 0x80, 0x2, 0x4761, {{0x8, 0x4, 0x1, 0x7, 0x20, 0x68, 0x0, 0x54, 0x29, 0x0, @multicast1, @private=0xa010101, {[@timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x5, [{@rand_addr=0x64010101, 0x3}]}]}}}}}) (async) r17 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='loginuid\x00') (async) r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3e0, '\x00', r3, r1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x3e, &(0x7f00000005c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc05}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x0, 0x1, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff8d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}], &(0x7f0000000b40)='syzkaller\x00', 0x80, 0x15, &(0x7f0000000800)=""/21, 0x0, 0x10, '\x00', r16, 0x0, r17, 0x8, &(0x7f0000000900)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xa, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r1, r18, r15, r1, r2, r2, r2, r1, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x3, 0x6, 0xb}, {0x0, 0x3, 0xa, 0x7}, {0x2, 0x4, 0xb, 0x5}], 0x10, 0xfffffbff}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) inotify_init() 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x4, &(0x7f0000000840)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) r5 = shmget(0x2, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) (async) getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {0x0}}, './file0\x00'}) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) r9 = gettid() (async) r10 = syz_clone(0x20000000, &(0x7f0000000580)="8e6b709bdb2333acc1a293e8da4e598d8680250f4167d291ddc4b262ac7e3c759c2c9104b9d379f86770b57da79a330ca1622ac79a7e30bd9c7b7ff97a407e7673e3a53f252f612394f7fb93ddffbbf07a770a101cc5d3eb5f84bae2248122917a2a4d64eb2073e800dc581208061b991ec1271a3a306cf8ac64c696b1f6087547d84b7facbd1e80df6ab163e20c17a2433e4c70d57dd41cf8a12fc27e941f00b07fa4edc45f1a0801359617c2962af351825c0aee", 0xb5, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000640)="a8ec1b2c5f672a5d12851e5e68a0e8093d74dc9a19248a3914dcf68e1fe35c91bb713f7835426ebc5f015f22f6b40f0ebd39958e4a6399f8b0572b565b8b93c6163f3efaaf02c4d153bad96e579445744f14f566a90e7d6985cfbebd4204fe447384ca357fabb2d126b739bc9139129be42870cf9096de87cb9246378773f14f3297f748747c7bcb8b1c3604938b82674278ab341cc30d") shmctl$IPC_SET(r5, 0x1, &(0x7f0000000700)={{0x2, 0xffffffffffffffff, r6, r7, r8, 0x2, 0x64}, 0x7, 0x5, 0x7f10e3a9, 0x8, r9, r10, 0x400}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0xf5, 0x20, 0x28, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, 0x7800, 0x40, 0x3ff, 0x10}}) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newneigh={0x50, 0x1c, 0x800, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r11, 0x2, 0x0, 0x7}, [@NDA_SRC_VNI={0x8, 0xb, 0x80000000}, @NDA_LINK_NETNSID={0x8, 0xa, 0x22f9}, @NDA_FLAGS_EXT={0x8}, @NDA_CACHEINFO={0x14, 0x3, {0x6, 0x0, 0x2, 0x6}}, @NDA_NH_ID={0x8, 0xd, 0x42}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x4004000) 12:14:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) [ 2245.462592][T13495] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2245.474121][T13495] CPU: 1 PID: 13495 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2245.484198][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2245.494276][T13495] Call Trace: [ 2245.497556][T13495] [ 2245.500494][T13495] dump_stack_lvl+0xda/0x130 [ 2245.505186][T13495] dump_stack+0x15/0x20 [ 2245.509345][T13495] dump_header+0x82/0x2d0 [ 2245.513689][T13495] oom_kill_process+0x33a/0x4c0 [ 2245.518632][T13495] out_of_memory+0x9ca/0xbf0 [ 2245.523248][T13495] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2245.529331][T13495] mem_cgroup_out_of_memory+0x139/0x190 [ 2245.534918][T13495] try_charge_memcg+0x759/0xd20 [ 2245.539838][T13495] ? __swap_duplicate+0x29b/0x2b0 [ 2245.544864][T13495] ? radix_tree_lookup+0xf9/0x150 [ 2245.549970][T13495] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2245.556162][T13495] __read_swap_cache_async+0x2b9/0x510 [ 2245.561643][T13495] swap_cluster_readahead+0x276/0x3f0 [ 2245.567022][T13495] swapin_readahead+0xe2/0x7a0 [ 2245.571786][T13495] ? __filemap_get_folio+0x41a/0x5a0 [ 2245.577081][T13495] ? __lruvec_stat_mod_folio+0xd7/0x120 [ 2245.582719][T13495] ? swap_cache_get_folio+0x6e/0x200 [ 2245.588022][T13495] do_swap_page+0x44c/0x1570 [ 2245.592650][T13495] ? __rcu_read_lock+0x35/0x50 [ 2245.597419][T13495] ? pte_offset_map_nolock+0x124/0x1d0 [ 2245.602896][T13495] handle_mm_fault+0x7f6/0x27b0 [ 2245.607853][T13495] ? mas_walk+0x204/0x320 [ 2245.612245][T13495] exc_page_fault+0x3ff/0x6d0 [ 2245.616934][T13495] asm_exc_page_fault+0x26/0x30 [ 2245.621836][T13495] RIP: 0033:0x7f6a5bd7cda4 [ 2245.626258][T13495] Code: 01 00 00 69 3d 11 e9 c9 00 e8 03 00 00 48 8d 1d f2 51 17 00 e8 9d 5f 04 00 eb 0f 0f 1f 00 48 81 c3 d0 00 00 00 48 39 eb 74 be <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df e8 f7 ee ff ff eb [ 2245.646012][T13495] RSP: 002b:00007ffd009d4f10 EFLAGS: 00010202 [ 2245.652109][T13495] RAX: 0000000000000000 RBX: 00007f6a5bef1f80 RCX: 0000000000000000 [ 2245.660079][T13495] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555556c34788 [ 2245.668086][T13495] RBP: 00007f6a5bef3980 R08: 0000000000000000 R09: 00007ffd009d70b0 [ 2245.676091][T13495] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000224416 [ 2245.684077][T13495] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 00000000002240d5 [ 2245.692083][T13495] [ 2245.695188][T13495] memory: usage 307200kB, limit 307200kB, failcnt 17849 [ 2245.702265][T13495] memory+swap: usage 307456kB, limit 9007199254740988kB, failcnt 0 [ 2245.710280][T13495] kmem: usage 307176kB, limit 9007199254740988kB, failcnt 0 [ 2245.717618][T13495] Memory cgroup stats for /syz1: [ 2245.717779][T13495] cache 8192 [ 2245.725993][T13495] rss 8192 [ 2245.729022][T13495] shmem 0 [ 2245.731995][T13495] mapped_file 0 [ 2245.735526][T13495] dirty 8192 [ 2245.738792][T13495] writeback 8192 [ 2245.742334][T13495] workingset_refault_anon 319 [ 2245.747033][T13495] workingset_refault_file 1 [ 2245.751582][T13495] swap 253952 [ 2245.754903][T13495] swapcached 16384 [ 2245.758635][T13495] pgpgin 1656982 [ 2245.762177][T13495] pgpgout 1656976 [ 2245.765873][T13495] pgfault 1274221 [ 2245.769537][T13495] pgmajfault 107 [ 2245.773077][T13495] inactive_anon 12288 [ 2245.777143][T13495] active_anon 4096 [ 2245.780872][T13495] inactive_file 0 [ 2245.784523][T13495] active_file 8192 [ 2245.788248][T13495] unevictable 0 [ 2245.791714][T13495] hierarchical_memory_limit 314572800 [ 2245.797146][T13495] hierarchical_memsw_limit 9223372036854771712 [ 2245.803306][T13495] total_cache 8192 [ 2245.807074][T13495] total_rss 8192 [ 2245.810689][T13495] total_shmem 0 [ 2245.814140][T13495] total_mapped_file 0 [ 2245.818154][T13495] total_dirty 8192 [ 2245.821881][T13495] total_writeback 8192 [ 2245.826061][T13495] total_workingset_refault_anon 319 [ 2245.831265][T13495] total_workingset_refault_file 1 [ 2245.836349][T13495] total_swap 253952 [ 2245.840266][T13495] total_swapcached 16384 [ 2245.844588][T13495] total_pgpgin 1656982 [ 2245.848676][T13495] total_pgpgout 1656976 [ 2245.852840][T13495] total_pgfault 1274221 [ 2245.857031][T13495] total_pgmajfault 107 [ 2245.861105][T13495] total_inactive_anon 12288 [ 2245.865658][T13495] total_active_anon 4096 [ 2245.869925][T13495] total_inactive_file 0 [ 2245.874278][T13495] total_active_file 8192 [ 2245.878672][T13495] total_unevictable 0 [ 2245.882660][T13495] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13495,uid=0 [ 2245.898016][T13495] Memory cgroup out of memory: Killed process 13495 (syz-executor.1) total-vm:46440kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x9, 0x0, 0xffffffff, 0x519, r0, 0x5, '\x00', 0x0, r1, 0x5, 0x5, 0x2}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'tunl0\x00', 0x0, 0x10, 0x7800, 0x0, 0x7fffffff, {{0x15, 0x4, 0x3, 0x8, 0x54, 0x66, 0x0, 0x1, 0x29, 0x0, @local, @rand_addr=0x64010102, {[@timestamp={0x44, 0x14, 0xe4, 0x0, 0xa, [0x8, 0x60000, 0x2, 0x5]}, @rr={0x7, 0x7, 0x54, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @lsrr={0x83, 0x23, 0xc4, [@remote, @rand_addr=0x64010102, @multicast2, @multicast2, @local, @local, @dev={0xac, 0x14, 0x14, 0x30}, @loopback]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xf, &(0x7f0000000100)=""/15, 0x41000, 0x20, '\x00', r3, 0x7, r1, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x6, 0xb8f1, 0x5}, 0x10, 0x0, r0, 0x6, &(0x7f0000000380)=[r1], &(0x7f00000003c0)=[{0x1, 0x5, 0x4}, {0x1, 0x1, 0x4, 0xa}, {0x5, 0x2, 0xc, 0x10}, {0x3, 0x2, 0x9, 0xa}, {0x5, 0x5, 0xa, 0x6}, {0x5, 0x4, 0x0, 0x4}], 0x10, 0x1}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x16, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xf, &(0x7f0000000100)=""/15, 0x41000, 0x20, '\x00', r3, 0x7, r1, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x6, 0xb8f1, 0x5}, 0x10, 0x0, r0, 0x6, &(0x7f0000000380)=[r1], &(0x7f00000003c0)=[{0x1, 0x5, 0x4}, {0x1, 0x1, 0x4, 0xa}, {0x5, 0x2, 0xc, 0x10}, {0x3, 0x2, 0x9, 0xa}, {0x5, 0x5, 0xa, 0x6}, {0x5, 0x4, 0x0, 0x4}], 0x10, 0x1}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r2, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r6 = accept4$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r9 = accept4$bt_l2cap(r6, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r9, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @noop, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @noop, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x10, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x77d, 0x0, 0x0, 0x0, 0x1a6}, {}, {}, [@generic={0x8, 0x8, 0x7, 0x23c, 0x8c30}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x7, 0xac, &(0x7f0000000c00)=""/172, 0x41000, 0x1d, '\x00', r3, 0x0, r10, 0x8, &(0x7f0000000cc0)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000d00)=[r4, r2, r4, r11, r14, r10], &(0x7f0000000d40)=[{0x1, 0x1, 0x7, 0x6}, {0x3, 0x4, 0x4, 0x6}, {0x0, 0x5, 0xc, 0x7}, {0x3, 0x2, 0xc, 0x4}, {0x0, 0x7, 0x8, 0x8}, {0x5, 0x4, 0x9}], 0x10, 0x400}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0x10, &(0x7f0000000b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x77d, 0x0, 0x0, 0x0, 0x1a6}, {}, {}, [@generic={0x8, 0x8, 0x7, 0x23c, 0x8c30}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x7, 0xac, &(0x7f0000000c00)=""/172, 0x41000, 0x1d, '\x00', r3, 0x0, r10, 0x8, &(0x7f0000000cc0)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000d00)=[r4, r2, r4, r11, r14, r10], &(0x7f0000000d40)=[{0x1, 0x1, 0x7, 0x6}, {0x3, 0x4, 0x4, 0x6}, {0x0, 0x5, 0xc, 0x7}, {0x3, 0x2, 0xc, 0x4}, {0x0, 0x7, 0x8, 0x8}, {0x5, 0x4, 0x9}], 0x10, 0x400}, 0x90) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r8, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000840)={'syztnl1\x00', r3, 0x7, 0x80, 0x2, 0x4761, {{0x8, 0x4, 0x1, 0x7, 0x20, 0x68, 0x0, 0x54, 0x29, 0x0, @multicast1, @private=0xa010101, {[@timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x5, [{@rand_addr=0x64010101, 0x3}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000840)={'syztnl1\x00', r3, 0x7, 0x80, 0x2, 0x4761, {{0x8, 0x4, 0x1, 0x7, 0x20, 0x68, 0x0, 0x54, 0x29, 0x0, @multicast1, @private=0xa010101, {[@timestamp_prespec={0x44, 0xc, 0x35, 0x3, 0x5, [{@rand_addr=0x64010101, 0x3}]}]}}}}}) r17 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='loginuid\x00') r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3e0, '\x00', r3, r1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x3e, &(0x7f00000005c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc05}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x0, 0x1, 0x1, 0xa, 0x0, 0xfffffffffffffff0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff8d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}], &(0x7f0000000b40)='syzkaller\x00', 0x80, 0x15, &(0x7f0000000800)=""/21, 0x0, 0x10, '\x00', r16, 0x0, r17, 0x8, &(0x7f0000000900)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0xa, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r1, r18, r15, r1, r2, r2, r2, r1, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x3, 0x3, 0x6, 0xb}, {0x0, 0x3, 0xa, 0x7}, {0x2, 0x4, 0xb, 0x5}], 0x10, 0xfffffbff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) inotify_init() 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'ip_vti0\x00', &(0x7f0000000a40)={'gre0\x00', r4, 0x0, 0x0, 0x20, 0x7f, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x65, 0x0, 0x3, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x31}, {[@timestamp={0x44, 0x10, 0xe7, 0x0, 0x9, [0x7, 0x0, 0x7f]}, @ssrr={0x89, 0x17, 0xd8, [@dev={0xac, 0x14, 0x14, 0x39}, @private=0xa010101, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "df0052c9bf35c6dc", "a47b7ac4b8058c175d06a9b602e380af8835ba56eac82edd3bd3a145479d6dad", "99e36b2d", "ea72cc129682307c"}, 0x38) 12:14:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000000000009500"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) socketpair(0x1, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x2, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x5}], 0x10, 0x10000}, 0x90) r17 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x6, 0x10}, 0xc) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) accept4$bt_l2cap(r6, 0x0, &(0x7f0000000bc0), 0xc00) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe2}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xf5, &(0x7f0000000300)=""/245, 0x41000, 0x61, '\x00', r5, 0x1e, r6, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x6, 0x5, 0x8}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000840)=[r7, r8, r9, r12, r13, r16, r17, 0xffffffffffffffff, r18], 0x0, 0x10, 0x81}, 0x90) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @multicast2}, 0x2, 0x2, 0x1, 0x3}}, {&(0x7f0000000040)=""/3, 0x3}, &(0x7f0000000080), 0x20}, 0xa0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000c80)={'syztnl0\x00', &(0x7f0000000c00)={'syztnl2\x00', r15, 0x6, 0x9, 0x20, 0x3f, 0x2, @local, @loopback, 0x797, 0x7800, 0x1, 0xa64}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x18, 0x9, 0xffffffff, 0x5, 0x1538, r16, 0x6, '\x00', r5, r6, 0x2, 0x4, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r19, &(0x7f00000009c0)="20a2b948d700947b88b97af4236fa3c447e5415b6742d2dd31b5aac125f8788690e8590e18636d278c89985b2a457b02d7dbfebf8f8539e7792dfbbc3f717d6be717c49cd77fc439a643f654160165bf41a5cb49fde4d746529a55f3551f1569186642767430935fca827c665321a7ac741ee934bf6ca653f71d74ed8b0ee88b810b25c4e748c7c75953fef9dcc8a01563e855c60cb317e885e93ba8ce6ea9d2772a05c244cf25f54427580bf7b50e2573871db3468377fc806b63dfc37c51608e9dfd724d96383c10c286aec5f948111a10da7d00c4a5f4e31ab532071164e72273313fb3", &(0x7f0000000ac0)=@udp6=r6, 0x4}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', r11, r6, 0x3, 0x0, 0x4}, 0x48) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async, rerun: 64) socketpair(0x1, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x2, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) (async) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x5}], 0x10, 0x10000}, 0x90) r17 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x6, 0x10}, 0xc) (async) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) accept4$bt_l2cap(r6, 0x0, &(0x7f0000000bc0), 0xc00) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe2}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xf5, &(0x7f0000000300)=""/245, 0x41000, 0x61, '\x00', r5, 0x1e, r6, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x6, 0x5, 0x8}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000840)=[r7, r8, r9, r12, r13, r16, r17, 0xffffffffffffffff, r18], 0x0, 0x10, 0x81}, 0x90) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @multicast2}, 0x2, 0x2, 0x1, 0x3}}, {&(0x7f0000000040)=""/3, 0x3}, &(0x7f0000000080), 0x20}, 0xa0) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000c80)={'syztnl0\x00', &(0x7f0000000c00)={'syztnl2\x00', r15, 0x6, 0x9, 0x20, 0x3f, 0x2, @local, @loopback, 0x797, 0x7800, 0x1, 0xa64}}) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async, rerun: 64) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x18, 0x9, 0xffffffff, 0x5, 0x1538, r16, 0x6, '\x00', r5, r6, 0x2, 0x4, 0x3}, 0x48) (rerun: 64) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r19, &(0x7f00000009c0)="20a2b948d700947b88b97af4236fa3c447e5415b6742d2dd31b5aac125f8788690e8590e18636d278c89985b2a457b02d7dbfebf8f8539e7792dfbbc3f717d6be717c49cd77fc439a643f654160165bf41a5cb49fde4d746529a55f3551f1569186642767430935fca827c665321a7ac741ee934bf6ca653f71d74ed8b0ee88b810b25c4e748c7c75953fef9dcc8a01563e855c60cb317e885e93ba8ce6ea9d2772a05c244cf25f54427580bf7b50e2573871db3468377fc806b63dfc37c51608e9dfd724d96383c10c286aec5f948111a10da7d00c4a5f4e31ab532071164e72273313fb3", &(0x7f0000000ac0)=@udp6=r6, 0x4}, 0x20) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', r11, r6, 0x3, 0x0, 0x4}, 0x48) 12:14:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) (async, rerun: 32) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) (async, rerun: 32) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async, rerun: 32) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) socketpair(0x1, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x2, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x5}], 0x10, 0x10000}, 0x90) r17 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x6, 0x10}, 0xc) (async) r18 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x48) accept4$bt_l2cap(r6, 0x0, &(0x7f0000000bc0), 0xc00) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe2}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xf5, &(0x7f0000000300)=""/245, 0x41000, 0x61, '\x00', r5, 0x1e, r6, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x6, 0x5, 0x8}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000840)=[r7, r8, r9, r12, r13, r16, r17, 0xffffffffffffffff, r18], 0x0, 0x10, 0x81}, 0x90) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @multicast2}, 0x2, 0x2, 0x1, 0x3}}, {&(0x7f0000000040)=""/3, 0x3}, &(0x7f0000000080), 0x20}, 0xa0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000c80)={'syztnl0\x00', &(0x7f0000000c00)={'syztnl2\x00', r15, 0x6, 0x9, 0x20, 0x3f, 0x2, @local, @loopback, 0x797, 0x7800, 0x1, 0xa64}}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x18, 0x9, 0xffffffff, 0x5, 0x1538, r16, 0x6, '\x00', r5, r6, 0x2, 0x4, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b00)={r19, &(0x7f00000009c0)="20a2b948d700947b88b97af4236fa3c447e5415b6742d2dd31b5aac125f8788690e8590e18636d278c89985b2a457b02d7dbfebf8f8539e7792dfbbc3f717d6be717c49cd77fc439a643f654160165bf41a5cb49fde4d746529a55f3551f1569186642767430935fca827c665321a7ac741ee934bf6ca653f71d74ed8b0ee88b810b25c4e748c7c75953fef9dcc8a01563e855c60cb317e885e93ba8ce6ea9d2772a05c244cf25f54427580bf7b50e2573871db3468377fc806b63dfc37c51608e9dfd724d96383c10c286aec5f948111a10da7d00c4a5f4e31ab532071164e72273313fb3", &(0x7f0000000ac0)=@udp6=r6, 0x4}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x1, '\x00', r11, r6, 0x3, 0x0, 0x4}, 0x48) 12:14:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x4, 0x18}, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x10, 0x8, 0x3, 0x8, {{0x6, 0x4, 0x0, 0x29, 0x18, 0x66, 0x0, 0x3, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2, {[@generic={0x82, 0x4, "4ddc"}]}}}}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1421, 0x0, 0x0, 0x0, 0xfffff000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0x1, 0x5, 0x7, 0x8000000000000073}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x35, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0x2, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0)=[{0x0, 0x4, 0x4, 0x4}, {0x5, 0x1, 0xc, 0x8}, {0x1, 0x3, 0x1, 0xc}, {0x2, 0x9, 0x5, 0xd}, {0x3, 0x1, 0x0, 0x9}, {0x4, 0x2, 0x9, 0x8}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 0: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r1, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000980)={@qipcrtr={0x2a, 0x2, 0x7fff}, {&(0x7f0000000880)=""/151, 0x97}, &(0x7f0000000940), 0x8}, 0xa0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0xeb, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x7, 0x8, 0x2f2, 0x9, {{0x7, 0x4, 0x3, 0x2, 0x1c, 0x68, 0x0, 0x0, 0x29, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @rr={0x7, 0x7, 0xce, [@rand_addr=0x64010102]}]}}}}}) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/rt_acct\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1c56, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/sctp\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x18, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff3479}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xf, 0x521, 0x587900fd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r8, r9, r10, r11, r12, r13, r14, r15], 0x0, 0x10, 0x3ff}, 0x90) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6c, &(0x7f0000000000)=0x4, 0x4) syz_clone(0xf00e8080, 0x0, 0x0, 0x0, 0x0, 0x0) r16 = socket$nl_audit(0x10, 0x3, 0x9) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r17, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "b26d15c683ff28fe", "68598ec0dbef83dcf11920725214456e", "66114411", "244064b88e835b41"}, 0x28) sendmsg$AUDIT_USER(r16, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000010c0)={&(0x7f00000021c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x4005000}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async, rerun: 64) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x4, 0x18}, 0xc) (rerun: 64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x10, 0x8, 0x3, 0x8, {{0x6, 0x4, 0x0, 0x29, 0x18, 0x66, 0x0, 0x3, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2, {[@generic={0x82, 0x4, "4ddc"}]}}}}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (rerun: 32) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1421, 0x0, 0x0, 0x0, 0xfffff000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0x1, 0x5, 0x7, 0x8000000000000073}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x35, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0x2, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0)=[{0x0, 0x4, 0x4, 0x4}, {0x5, 0x1, 0xc, 0x8}, {0x1, 0x3, 0x1, 0xc}, {0x2, 0x9, 0x5, 0xd}, {0x3, 0x1, 0x0, 0x9}, {0x4, 0x2, 0x9, 0x8}]}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (rerun: 32) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x4, 0x18}, 0xc) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x10, 0x8, 0x3, 0x8, {{0x6, 0x4, 0x0, 0x29, 0x18, 0x66, 0x0, 0x3, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2, {[@generic={0x82, 0x4, "4ddc"}]}}}}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1421, 0x0, 0x0, 0x0, 0xfffff000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @jmp={0x5, 0x1, 0x1, 0x5, 0x7, 0x8000000000000073}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x2, '\x00', r2, 0x35, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0x2, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0)=[{0x0, 0x4, 0x4, 0x4}, {0x5, 0x1, 0xc, 0x8}, {0x1, 0x3, 0x1, 0xc}, {0x2, 0x9, 0x5, 0xd}, {0x3, 0x1, 0x0, 0x9}, {0x4, 0x2, 0x9, 0x8}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x2d1df8c7, 0x0, 0x7fffffff, 0x2000, 0x1, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e1710000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x6, 0x0, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x8000, 0xba3, 0x7}}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x6}, @generic={0x80, 0x1, 0x8, 0x3, 0xe4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x6, 0x0, &(0x7f0000000480), 0xca2dbbd611d25fe1, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x7, 0x929f}, 0x10, 0x308ce, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x3, 0x5, 0x0, 0x2}, {0x2, 0x4, 0x7, 0x2}, {0x1, 0x4, 0xb, 0x7}, {0x0, 0x4, 0x10}, {0x3, 0x4, 0xf, 0x9}, {0x2, 0x1, 0x2}], 0x10, 0xf9c4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0x13, &(0x7f0000000080)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffc}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x6f}, @jmp={0x5, 0x0, 0x3, 0x5, 0x6, 0xffffffffffffffe0, 0x11}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', r3, 0x2f, r4, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x7, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x5, 0x0, &(0x7f00000006c0)=[{0x3, 0x2, 0x0, 0x6}, {0x4, 0x5, 0x10, 0xb}, {0x1, 0x4, 0x7, 0x1}, {0x5, 0x5, 0x10, 0x4}, {0x5, 0x2, 0x2, 0x4}], 0x10, 0xf9}, 0x90) [ 2246.877915][T13593] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2246.889260][T13593] CPU: 0 PID: 13593 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2246.899411][T13593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2246.909486][T13593] Call Trace: [ 2246.912788][T13593] [ 2246.915734][T13593] dump_stack_lvl+0xda/0x130 [ 2246.920356][T13593] dump_stack+0x15/0x20 [ 2246.924534][T13593] dump_header+0x82/0x2d0 [ 2246.928985][T13593] oom_kill_process+0x33a/0x4c0 [ 2246.933909][T13593] out_of_memory+0x9ca/0xbf0 [ 2246.938588][T13593] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2246.944700][T13593] mem_cgroup_out_of_memory+0x139/0x190 [ 2246.950309][T13593] try_charge_memcg+0x759/0xd20 [ 2246.955206][T13593] ? __swap_duplicate+0x29b/0x2b0 [ 2246.960319][T13593] ? radix_tree_lookup+0xf9/0x150 [ 2246.965448][T13593] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2246.971548][T13593] __read_swap_cache_async+0x2b9/0x510 [ 2246.977033][T13593] swap_cluster_readahead+0x276/0x3f0 [ 2246.982471][T13593] swapin_readahead+0xe2/0x7a0 [ 2246.987361][T13593] ? __filemap_get_folio+0x41a/0x5a0 [ 2246.992754][T13593] ? swap_cache_get_folio+0x6e/0x200 [ 2246.998083][T13593] do_swap_page+0x44c/0x1570 [ 2247.002750][T13593] ? _raw_spin_unlock+0x26/0x40 [ 2247.007625][T13593] ? __rcu_read_lock+0x35/0x50 [ 2247.012411][T13593] ? pte_offset_map_nolock+0x124/0x1d0 [ 2247.017904][T13593] handle_mm_fault+0x7f6/0x27b0 [ 2247.022788][T13593] exc_page_fault+0x2f7/0x6d0 [ 2247.027569][T13593] asm_exc_page_fault+0x26/0x30 [ 2247.032534][T13593] RIP: 0010:__get_user_8+0x11/0x20 [ 2247.037713][T13593] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 8b 10 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <48> 8b 10 31 c0 0f 01 ca c3 66 0f 1f 44 00 00 f3 0f 1e fa 0f 01 cb [ 2247.057349][T13593] RSP: 0018:ffffc900012c7e38 EFLAGS: 00050202 [ 2247.063416][T13593] RAX: 0000555556c34da8 RBX: ffffc900012c7e40 RCX: ffffffff8144b3b3 [ 2247.071390][T13593] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881040caa50 [ 2247.079469][T13593] RBP: ffffc900012c7f00 R08: 00018881040caa57 R09: 0000000000000000 [ 2247.087533][T13593] R10: 0001ffffffffffff R11: 0000000000001677 R12: ffff8881040ca080 [ 2247.095521][T13593] R13: ffff8881040caa50 R14: ffffc900012c7f58 R15: ffffc900012c7fd8 [ 2247.103603][T13593] ? __rseq_handle_notify_resume+0xb3/0xbf0 [ 2247.109526][T13593] __rseq_handle_notify_resume+0xc7/0xbf0 [ 2247.115370][T13593] ? blkcg_maybe_throttle_current+0xa0/0x710 [ 2247.121372][T13593] ? __se_sys_clock_nanosleep+0x202/0x230 [ 2247.127119][T13593] ? mem_cgroup_handle_over_high+0x2c/0x1b0 [ 2247.133161][T13593] syscall_exit_to_user_mode+0x8e/0x130 [ 2247.138795][T13593] do_syscall_64+0x65/0x120 [ 2247.143345][T13593] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2247.149278][T13593] RIP: 0033:0x7f6a5bdee1b5 [ 2247.153710][T13593] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 f6 b9 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 4f ba ff ff 48 8b 04 24 48 83 c4 28 f7 d8 [ 2247.173476][T13593] RSP: 002b:00007ffd009d4ea0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 2247.181908][T13593] RAX: 0000000000000000 RBX: 00007f6a5bef1f80 RCX: 00007f6a5bdee1b5 [ 2247.189896][T13593] RDX: 00007ffd009d4ee0 RSI: 0000000000000000 RDI: 0000000000000000 [ 2247.197927][T13593] RBP: 00007f6a5bef3980 R08: 0000000000000000 R09: 00007ffd009d70b0 [ 2247.205916][T13593] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000022498e [ 2247.213904][T13593] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 000000000022464d [ 2247.221911][T13593] [ 2247.225031][T13593] memory: usage 400kB, limit 307200kB, failcnt 18497 [ 2247.231728][T13593] memory+swap: usage 684kB, limit 9007199254740988kB, failcnt 0 [ 2247.239395][T13593] kmem: usage 268kB, limit 9007199254740988kB, failcnt 0 [ 2247.246455][T13593] Memory cgroup stats for /syz1: [ 2247.246619][T13593] cache 8192 [ 2247.254781][T13593] rss 16384 [ 2247.257894][T13593] shmem 0 [ 2247.260845][T13593] mapped_file 0 [ 2247.264343][T13593] dirty 8192 [ 2247.267565][T13593] writeback 0 [ 2247.270922][T13593] workingset_refault_anon 356 [ 2247.275766][T13593] workingset_refault_file 1 [ 2247.280281][T13593] swap 290816 [ 2247.283573][T13593] swapcached 49152 [ 2247.287424][T13593] pgpgin 1657046 [ 2247.290971][T13593] pgpgout 1657031 [ 2247.294655][T13593] pgfault 1274422 [ 2247.298297][T13593] pgmajfault 118 [ 2247.301850][T13593] inactive_anon 53248 [ 2247.305862][T13593] active_anon 0 [ 2247.309356][T13593] inactive_file 8192 [ 2247.313252][T13593] active_file 0 [ 2247.316823][T13593] unevictable 0 [ 2247.320312][T13593] hierarchical_memory_limit 314572800 [ 2247.325799][T13593] hierarchical_memsw_limit 9223372036854771712 [ 2247.331988][T13593] total_cache 8192 [ 2247.335774][T13593] total_rss 16384 [ 2247.339463][T13593] total_shmem 0 [ 2247.342965][T13593] total_mapped_file 0 [ 2247.346999][T13593] total_dirty 8192 [ 2247.350791][T13593] total_writeback 0 [ 2247.354621][T13593] total_workingset_refault_anon 356 [ 2247.359839][T13593] total_workingset_refault_file 1 [ 2247.364912][T13593] total_swap 290816 [ 2247.368720][T13593] total_swapcached 49152 [ 2247.372977][T13593] total_pgpgin 1657046 [ 2247.377088][T13593] total_pgpgout 1657031 [ 2247.381272][T13593] total_pgfault 1274422 [ 2247.385465][T13593] total_pgmajfault 118 [ 2247.389563][T13593] total_inactive_anon 53248 [ 2247.394054][T13593] total_active_anon 0 [ 2247.398053][T13593] total_inactive_file 8192 [ 2247.402548][T13593] total_active_file 0 [ 2247.406559][T13593] total_unevictable 0 [ 2247.410533][T13593] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13593,uid=0 12:14:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x80, 0x1, 0x0, 0x62, {{0x1c, 0x4, 0x3, 0x3d, 0x70, 0x68, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@generic={0x44, 0xb, "851376df6c8cfadbba"}, @timestamp_prespec={0x44, 0x24, 0x74, 0x3, 0x5, [{@local}, {@local, 0x3}, {@multicast1, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x5}]}, @timestamp_prespec={0x44, 0x2c, 0xe2, 0x3, 0x9, [{@multicast2}, {@rand_addr=0x64010102, 0xebd}, {@multicast2, 0x6}, {@rand_addr=0x64010101}, {@empty, 0x7}]}, @noop]}}}}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x3f, 0x0, r3, 0x2041cda9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:27 executing program 0: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r1, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000980)={@qipcrtr={0x2a, 0x2, 0x7fff}, {&(0x7f0000000880)=""/151, 0x97}, &(0x7f0000000940), 0x8}, 0xa0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0xeb, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x7, 0x8, 0x2f2, 0x9, {{0x7, 0x4, 0x3, 0x2, 0x1c, 0x68, 0x0, 0x0, 0x29, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @rr={0x7, 0x7, 0xce, [@rand_addr=0x64010102]}]}}}}}) (async) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/rt_acct\x00') (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1c56, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/sctp\x00') (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x18, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff3479}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xf, 0x521, 0x587900fd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r8, r9, r10, r11, r12, r13, r14, r15], 0x0, 0x10, 0x3ff}, 0x90) (async) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6c, &(0x7f0000000000)=0x4, 0x4) syz_clone(0xf00e8080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r16 = socket$nl_audit(0x10, 0x3, 0x9) (async) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r17, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "b26d15c683ff28fe", "68598ec0dbef83dcf11920725214456e", "66114411", "244064b88e835b41"}, 0x28) (async) sendmsg$AUDIT_USER(r16, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000010c0)={&(0x7f00000021c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x4005000}, 0x0) (async) socket$nl_audit(0x10, 0x3, 0x9) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x6, 0x0, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x8000, 0xba3, 0x7}}) (async, rerun: 32) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00') (async, rerun: 32) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x6}, @generic={0x80, 0x1, 0x8, 0x3, 0xe4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x6, 0x0, &(0x7f0000000480), 0xca2dbbd611d25fe1, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x7, 0x929f}, 0x10, 0x308ce, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x3, 0x5, 0x0, 0x2}, {0x2, 0x4, 0x7, 0x2}, {0x1, 0x4, 0xb, 0x7}, {0x0, 0x4, 0x10}, {0x3, 0x4, 0xf, 0x9}, {0x2, 0x1, 0x2}], 0x10, 0xf9c4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0x13, &(0x7f0000000080)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffc}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x6f}, @jmp={0x5, 0x0, 0x3, 0x5, 0x6, 0xffffffffffffffe0, 0x11}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', r3, 0x2f, r4, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x7, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x5, 0x0, &(0x7f00000006c0)=[{0x3, 0x2, 0x0, 0x6}, {0x4, 0x5, 0x10, 0xb}, {0x1, 0x4, 0x7, 0x1}, {0x5, 0x5, 0x10, 0x4}, {0x5, 0x2, 0x2, 0x4}], 0x10, 0xf9}, 0x90) [ 2247.425890][T13593] Memory cgroup out of memory: Killed process 13593 (syz-executor.1) total-vm:46440kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x80, 0x1, 0x0, 0x62, {{0x1c, 0x4, 0x3, 0x3d, 0x70, 0x68, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@generic={0x44, 0xb, "851376df6c8cfadbba"}, @timestamp_prespec={0x44, 0x24, 0x74, 0x3, 0x5, [{@local}, {@local, 0x3}, {@multicast1, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x5}]}, @timestamp_prespec={0x44, 0x2c, 0xe2, 0x3, 0x9, [{@multicast2}, {@rand_addr=0x64010102, 0xebd}, {@multicast2, 0x6}, {@rand_addr=0x64010101}, {@empty, 0x7}]}, @noop]}}}}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x3f, 0x0, r3, 0x2041cda9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x6, 0x0, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x8000, 0xba3, 0x7}}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x6}, @generic={0x80, 0x1, 0x8, 0x3, 0xe4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x6, 0x0, &(0x7f0000000480), 0xca2dbbd611d25fe1, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x7, 0x929f}, 0x10, 0x308ce, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x3, 0x5, 0x0, 0x2}, {0x2, 0x4, 0x7, 0x2}, {0x1, 0x4, 0xb, 0x7}, {0x0, 0x4, 0x10}, {0x3, 0x4, 0xf, 0x9}, {0x2, 0x1, 0x2}], 0x10, 0xf9c4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0x13, &(0x7f0000000080)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffc}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x6f}, @jmp={0x5, 0x0, 0x3, 0x5, 0x6, 0xffffffffffffffe0, 0x11}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', r3, 0x2f, r4, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x7, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x5, 0x0, &(0x7f00000006c0)=[{0x3, 0x2, 0x0, 0x6}, {0x4, 0x5, 0x10, 0xb}, {0x1, 0x4, 0x7, 0x1}, {0x5, 0x5, 0x10, 0x4}, {0x5, 0x2, 0x2, 0x4}], 0x10, 0xf9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1}, 0x48) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x6, 0x0, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8, 0x8000, 0xba3, 0x7}}) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='status\x00') (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x6}, @generic={0x80, 0x1, 0x8, 0x3, 0xe4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='GPL\x00', 0x6, 0x0, &(0x7f0000000480), 0xca2dbbd611d25fe1, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x7, 0x929f}, 0x10, 0x308ce, 0xffffffffffffffff, 0x6, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x3, 0x5, 0x0, 0x2}, {0x2, 0x4, 0x7, 0x2}, {0x1, 0x4, 0xb, 0x7}, {0x0, 0x4, 0x10}, {0x3, 0x4, 0xf, 0x9}, {0x2, 0x1, 0x2}], 0x10, 0xf9c4}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0x13, &(0x7f0000000080)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffc}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x6f}, @jmp={0x5, 0x0, 0x3, 0x5, 0x6, 0xffffffffffffffe0, 0x11}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x3}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', r3, 0x2f, r4, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x7, 0x8}, 0x10, 0xffffffffffffffff, r5, 0x5, 0x0, &(0x7f00000006c0)=[{0x3, 0x2, 0x0, 0x6}, {0x4, 0x5, 0x10, 0xb}, {0x1, 0x4, 0x7, 0x1}, {0x5, 0x5, 0x10, 0x4}, {0x5, 0x2, 0x2, 0x4}], 0x10, 0xf9}, 0x90) (async) 12:14:27 executing program 0: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r1, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000980)={@qipcrtr={0x2a, 0x2, 0x7fff}, {&(0x7f0000000880)=""/151, 0x97}, &(0x7f0000000940), 0x8}, 0xa0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0xeb, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x7, 0x8, 0x2f2, 0x9, {{0x7, 0x4, 0x3, 0x2, 0x1c, 0x68, 0x0, 0x0, 0x29, 0x0, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @rr={0x7, 0x7, 0xce, [@rand_addr=0x64010102]}]}}}}}) syz_open_procfs(0x0, &(0x7f00000002c0)='net/rt_acct\x00') (async) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/rt_acct\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1c56, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/sctp\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x18, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff3479}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000300)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xf, 0x521, 0x587900fd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r8, r9, r10, r11, r12, r13, r14, r15], 0x0, 0x10, 0x3ff}, 0x90) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6c, &(0x7f0000000000)=0x4, 0x4) syz_clone(0xf00e8080, 0x0, 0x0, 0x0, 0x0, 0x0) r16 = socket$nl_audit(0x10, 0x3, 0x9) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r17, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "b26d15c683ff28fe", "68598ec0dbef83dcf11920725214456e", "66114411", "244064b88e835b41"}, 0x28) (async) setsockopt$inet6_tcp_TLS_RX(r17, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "b26d15c683ff28fe", "68598ec0dbef83dcf11920725214456e", "66114411", "244064b88e835b41"}, 0x28) sendmsg$AUDIT_USER(r16, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000010c0)={&(0x7f00000021c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x4005000}, 0x0) (async) sendmsg$AUDIT_USER(r16, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000010c0)={&(0x7f00000021c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x4005000}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x4, 0x21, [0x1ff, 0xfff, 0x0, 0x7, 0xde, 0x2], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000040)=""/33}, &(0x7f0000000100)=0x78) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x80, 0x1, 0x0, 0x62, {{0x1c, 0x4, 0x3, 0x3d, 0x70, 0x68, 0x0, 0x2, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@generic={0x44, 0xb, "851376df6c8cfadbba"}, @timestamp_prespec={0x44, 0x24, 0x74, 0x3, 0x5, [{@local}, {@local, 0x3}, {@multicast1, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x5}]}, @timestamp_prespec={0x44, 0x2c, 0xe2, 0x3, 0x9, [{@multicast2}, {@rand_addr=0x64010102, 0xebd}, {@multicast2, 0x6}, {@rand_addr=0x64010101}, {@empty, 0x7}]}, @noop]}}}}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x3f, 0x0, r3, 0x2041cda9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x4, 0x21, [0x1ff, 0xfff, 0x0, 0x7, 0xde, 0x2], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000040)=""/33}, &(0x7f0000000100)=0x78) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r0}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000940)='net/fib_trie\x00') r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x3, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x7, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x3, 0x0, 0x3, 0x3, 0x9, 0x2}, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb7}}, @ldst={0x0, 0x0, 0x3, 0x7, 0x7, 0x40, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0x16bf8, 0x23, &(0x7f0000000900)=""/35, 0x40f00, 0x61, '\x00', 0x0, 0x12, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x2, 0x101, 0x3}, 0x10, 0x0, r0, 0x5, &(0x7f0000000a00)=[r6, 0x1], &(0x7f0000000a40)=[{0x1, 0x4, 0xc, 0x5}, {0x4, 0x4, 0xa}, {0x4, 0x4, 0x10}, {0x5, 0x1, 0x2, 0x7}, {0x0, 0x4, 0xa, 0xc}], 0x10, 0xfff}, 0x90) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000580)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x5, 0x6, {{0xa, 0x4, 0x2, 0x35, 0x28, 0x68, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0x13, 0x74, [@remote, @multicast1, @private=0xa010101, @loopback]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000680)={'syztnl0\x00', &(0x7f0000000600)={'gretap0\x00', r8, 0x20, 0x7, 0x3, 0x21, {{0xa, 0x4, 0x0, 0x2, 0x28, 0x68, 0x0, 0x6, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@timestamp={0x44, 0x14, 0xe6, 0x0, 0x5, [0x7, 0x68, 0x96, 0x9]}]}}}}}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r9, {0xee00}}, './file0\x00'}) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x8, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x13, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x124, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5007}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000100)='GPL\x00', 0xff, 0x95, &(0x7f0000000180)=""/149, 0x41000, 0x46, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x7, 0x44, 0x8}, 0x10, 0xd015, 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[r13, 0x1, r14], &(0x7f0000000380)=[{0x5, 0x2, 0x2, 0x9}, {0xe55, 0x1, 0xa, 0x2}, {0x2, 0x1, 0x10, 0xb}], 0x10, 0x1}, 0x90) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e171000000000000"], &(0x7f0000001e40)='GPL\x00', 0x8}, 0x90) 12:14:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x4, 0x21, [0x1ff, 0xfff, 0x0, 0x7, 0xde, 0x2], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000040)=""/33}, &(0x7f0000000100)=0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], 0x0, 0x8}, 0x90) 12:14:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000b5aee71f45d23fb7374cc836"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd26, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x4040000) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], 0x0, 0x8}, 0x90) 12:14:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:27 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd26, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x4040000) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) socket$nl_audit(0x10, 0x3, 0x9) (async) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) (async) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd26, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x4040000) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) (async) 12:14:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r0}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000940)='net/fib_trie\x00') (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x3, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x7, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x3, 0x0, 0x3, 0x3, 0x9, 0x2}, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb7}}, @ldst={0x0, 0x0, 0x3, 0x7, 0x7, 0x40, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0x16bf8, 0x23, &(0x7f0000000900)=""/35, 0x40f00, 0x61, '\x00', 0x0, 0x12, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x2, 0x101, 0x3}, 0x10, 0x0, r0, 0x5, &(0x7f0000000a00)=[r6, 0x1], &(0x7f0000000a40)=[{0x1, 0x4, 0xc, 0x5}, {0x4, 0x4, 0xa}, {0x4, 0x4, 0x10}, {0x5, 0x1, 0x2, 0x7}, {0x0, 0x4, 0xa, 0xc}], 0x10, 0xfff}, 0x90) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000580)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x5, 0x6, {{0xa, 0x4, 0x2, 0x35, 0x28, 0x68, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0x13, 0x74, [@remote, @multicast1, @private=0xa010101, @loopback]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000680)={'syztnl0\x00', &(0x7f0000000600)={'gretap0\x00', r8, 0x20, 0x7, 0x3, 0x21, {{0xa, 0x4, 0x0, 0x2, 0x28, 0x68, 0x0, 0x6, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@timestamp={0x44, 0x14, 0xe6, 0x0, 0x5, [0x7, 0x68, 0x96, 0x9]}]}}}}}) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r9, {0xee00}}, './file0\x00'}) (async) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x8, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x13, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x124, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5007}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000100)='GPL\x00', 0xff, 0x95, &(0x7f0000000180)=""/149, 0x41000, 0x46, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x7, 0x44, 0x8}, 0x10, 0xd015, 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[r13, 0x1, r14], &(0x7f0000000380)=[{0x5, 0x2, 0x2, 0x9}, {0xe55, 0x1, 0xa, 0x2}, {0x2, 0x1, 0x10, 0xb}], 0x10, 0x1}, 0x90) 12:14:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12:14:28 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/sockstat\x00') 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], 0x0, 0x8}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) [ 2247.804196][T13756] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13756 comm=syz-executor.5 12:14:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:28 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd26, 0x25dfdbff, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x4040000) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12:14:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r0}, 0x20) (async) r5 = syz_open_procfs(0x0, &(0x7f0000000940)='net/fib_trie\x00') r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x3, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x7, 0x27, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@alu={0x3, 0x0, 0x3, 0x3, 0x9, 0x2}, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb7}}, @ldst={0x0, 0x0, 0x3, 0x7, 0x7, 0x40, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='syzkaller\x00', 0x16bf8, 0x23, &(0x7f0000000900)=""/35, 0x40f00, 0x61, '\x00', 0x0, 0x12, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0x2, 0x101, 0x3}, 0x10, 0x0, r0, 0x5, &(0x7f0000000a00)=[r6, 0x1], &(0x7f0000000a40)=[{0x1, 0x4, 0xc, 0x5}, {0x4, 0x4, 0xa}, {0x4, 0x4, 0x10}, {0x5, 0x1, 0x2, 0x7}, {0x0, 0x4, 0xa, 0xc}], 0x10, 0xfff}, 0x90) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000580)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x5, 0x6, {{0xa, 0x4, 0x2, 0x35, 0x28, 0x68, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@lsrr={0x83, 0x13, 0x74, [@remote, @multicast1, @private=0xa010101, @loopback]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000680)={'syztnl0\x00', &(0x7f0000000600)={'gretap0\x00', r8, 0x20, 0x7, 0x3, 0x21, {{0xa, 0x4, 0x0, 0x2, 0x28, 0x68, 0x0, 0x6, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@timestamp={0x44, 0x14, 0xe6, 0x0, 0x5, [0x7, 0x68, 0x96, 0x9]}]}}}}}) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r9, {0xee00}}, './file0\x00'}) (async) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x8, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x13, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x124, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5007}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000100)='GPL\x00', 0xff, 0x95, &(0x7f0000000180)=""/149, 0x41000, 0x46, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x7, 0x44, 0x8}, 0x10, 0xd015, 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[r13, 0x1, r14], &(0x7f0000000380)=[{0x5, 0x2, 0x2, 0x9}, {0xe55, 0x1, 0xa, 0x2}, {0x2, 0x1, 0x10, 0xb}], 0x10, 0x1}, 0x90) 12:14:28 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/sockstat\x00') 12:14:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000e17100000000000095"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, r1, 0x0, 0x5, 0x0, 0xe8, "6d333ec56b4ceae0ce33ebf1d58c9628fb483b690babf7eaa32bb4d233c3d0ed0cbfe3c5dd4058f65177f8133446f09cac95b3f0be8c83e1edda1216c42f02", 0x27}, 0x60) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:28 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, r1, 0x0, 0x5, 0x0, 0xe8, "6d333ec56b4ceae0ce33ebf1d58c9628fb483b690babf7eaa32bb4d233c3d0ed0cbfe3c5dd4058f65177f8133446f09cac95b3f0be8c83e1edda1216c42f02", 0x27}, 0x60) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) 12:14:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='uid_map\x00') getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000080000000000ef198c4d56f2c5ad000000000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x88, 0x5, 0x9, @dev={0xfe, 0x80, '\x00', 0x17}, @remote, 0x80, 0x8, 0x3f, 0x8}}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x4e24, 0x1, 0x4e24, 0x7, 0xa, 0x20, 0x80, 0x7, r3, 0xffffffffffffffff}, {0x9, 0x0, 0x54aa, 0xeb23, 0x401, 0x7ff, 0x9, 0x187}, {0x4844c67a, 0x20, 0x4, 0x6}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6=@empty, 0x3503, 0x3, 0x2, 0x5, 0x8, 0x80000001}}, 0xe8) 12:14:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='uid_map\x00') getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000080000000000ef198c4d56f2c5ad000000000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x88, 0x5, 0x9, @dev={0xfe, 0x80, '\x00', 0x17}, @remote, 0x80, 0x8, 0x3f, 0x8}}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x4e24, 0x1, 0x4e24, 0x7, 0xa, 0x20, 0x80, 0x7, r3, 0xffffffffffffffff}, {0x9, 0x0, 0x54aa, 0xeb23, 0x401, 0x7ff, 0x9, 0x187}, {0x4844c67a, 0x20, 0x4, 0x6}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6=@empty, 0x3503, 0x3, 0x2, 0x5, 0x8, 0x80000001}}, 0xe8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='uid_map\x00') (async) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000080000000000ef198c4d56f2c5ad000000000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x88, 0x5, 0x9, @dev={0xfe, 0x80, '\x00', 0x17}, @remote, 0x80, 0x8, 0x3f, 0x8}}) (async) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x4e24, 0x1, 0x4e24, 0x7, 0xa, 0x20, 0x80, 0x7, r3, 0xffffffffffffffff}, {0x9, 0x0, 0x54aa, 0xeb23, 0x401, 0x7ff, 0x9, 0x187}, {0x4844c67a, 0x20, 0x4, 0x6}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6=@empty, 0x3503, 0x3, 0x2, 0x5, 0x8, 0x80000001}}, 0xe8) (async) 12:14:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='uid_map\x00') getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000080000000000ef198c4d56f2c5ad000000000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x88, 0x5, 0x9, @dev={0xfe, 0x80, '\x00', 0x17}, @remote, 0x80, 0x8, 0x3f, 0x8}}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x4e24, 0x1, 0x4e24, 0x7, 0xa, 0x20, 0x80, 0x7, r3, 0xffffffffffffffff}, {0x9, 0x0, 0x54aa, 0xeb23, 0x401, 0x7ff, 0x9, 0x187}, {0x4844c67a, 0x20, 0x4, 0x6}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6=@empty, 0x3503, 0x3, 0x2, 0x5, 0x8, 0x80000001}}, 0xe8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='uid_map\x00') (async) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000080000000000ef198c4d56f2c5ad000000000000"], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) (async) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x1f, 0x88, 0x5, 0x9, @dev={0xfe, 0x80, '\x00', 0x17}, @remote, 0x80, 0x8, 0x3f, 0x8}}) (async) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x4e24, 0x1, 0x4e24, 0x7, 0xa, 0x20, 0x80, 0x7, r3, 0xffffffffffffffff}, {0x9, 0x0, 0x54aa, 0xeb23, 0x401, 0x7ff, 0x9, 0x187}, {0x4844c67a, 0x20, 0x4, 0x6}, 0x5, 0x6e6bc0, 0x1, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d2, 0x6c}, 0xa, @in6=@empty, 0x3503, 0x3, 0x2, 0x5, 0x8, 0x80000001}}, 0xe8) (async) 12:14:28 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)=0x0) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, r1, 0x0, 0x5, 0x0, 0xe8, "6d333ec56b4ceae0ce33ebf1d58c9628fb483b690babf7eaa32bb4d233c3d0ed0cbfe3c5dd4058f65177f8133446f09cac95b3f0be8c83e1edda1216c42f02", 0x27}, 0x60) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) connect$nfc_llcp(r0, &(0x7f0000000040)={0x27, r1, 0x0, 0x5, 0x0, 0xe8, "6d333ec56b4ceae0ce33ebf1d58c9628fb483b690babf7eaa32bb4d233c3d0ed0cbfe3c5dd4058f65177f8133446f09cac95b3f0be8c83e1edda1216c42f02", 0x27}, 0x60) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) (async) 12:14:28 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7, 0x40, 0x0, 0x2, {{0x19, 0x4, 0x0, 0x2, 0x64, 0x64, 0x0, 0x7f, 0x29, 0x0, @private=0xa010102, @loopback, {[@noop, @generic={0x7, 0xe, "e8ec2d0eed4c1af79d5b7c70"}, @lsrr={0x83, 0x7, 0xa1, [@private=0xa010102]}, @lsrr={0x83, 0x1f, 0x23, [@empty, @multicast1, @local, @broadcast, @empty, @broadcast, @local]}, @lsrr={0x83, 0x17, 0x6a, [@local, @multicast2, @empty, @broadcast, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', r0, 0x0, 0x1, 0x0, 0x4, 0x34, @private1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x80, 0x0, 0x3, 0x3}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x7, &(0x7f0000000100)=@framed={{}, [@ringbuf_query]}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) 12:14:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1a, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, r7, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x10}], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:28 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7, 0x40, 0x0, 0x2, {{0x19, 0x4, 0x0, 0x2, 0x64, 0x64, 0x0, 0x7f, 0x29, 0x0, @private=0xa010102, @loopback, {[@noop, @generic={0x7, 0xe, "e8ec2d0eed4c1af79d5b7c70"}, @lsrr={0x83, 0x7, 0xa1, [@private=0xa010102]}, @lsrr={0x83, 0x1f, 0x23, [@empty, @multicast1, @local, @broadcast, @empty, @broadcast, @local]}, @lsrr={0x83, 0x17, 0x6a, [@local, @multicast2, @empty, @broadcast, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', r0, 0x0, 0x1, 0x0, 0x4, 0x34, @private1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x80, 0x0, 0x3, 0x3}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x7, &(0x7f0000000100)=@framed={{}, [@ringbuf_query]}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7, 0x40, 0x0, 0x2, {{0x19, 0x4, 0x0, 0x2, 0x64, 0x64, 0x0, 0x7f, 0x29, 0x0, @private=0xa010102, @loopback, {[@noop, @generic={0x7, 0xe, "e8ec2d0eed4c1af79d5b7c70"}, @lsrr={0x83, 0x7, 0xa1, [@private=0xa010102]}, @lsrr={0x83, 0x1f, 0x23, [@empty, @multicast1, @local, @broadcast, @empty, @broadcast, @local]}, @lsrr={0x83, 0x17, 0x6a, [@local, @multicast2, @empty, @broadcast, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', r0, 0x0, 0x1, 0x0, 0x4, 0x34, @private1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x80, 0x0, 0x3, 0x3}}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x7, &(0x7f0000000100)=@framed={{}, [@ringbuf_query]}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) (async) 12:14:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/sockstat\x00') socket$inet_udp(0x2, 0x2, 0x0) (async) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) (async) syz_open_procfs(r0, &(0x7f0000000000)='net/sockstat\x00') (async) 12:14:29 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7, 0x40, 0x0, 0x2, {{0x19, 0x4, 0x0, 0x2, 0x64, 0x64, 0x0, 0x7f, 0x29, 0x0, @private=0xa010102, @loopback, {[@noop, @generic={0x7, 0xe, "e8ec2d0eed4c1af79d5b7c70"}, @lsrr={0x83, 0x7, 0xa1, [@private=0xa010102]}, @lsrr={0x83, 0x1f, 0x23, [@empty, @multicast1, @local, @broadcast, @empty, @broadcast, @local]}, @lsrr={0x83, 0x17, 0x6a, [@local, @multicast2, @empty, @broadcast, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', r0, 0x0, 0x1, 0x0, 0x4, 0x34, @private1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x80, 0x0, 0x3, 0x3}}) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x7, &(0x7f0000000100)=@framed={{}, [@ringbuf_query]}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1a, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, r7, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1a, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, r7, 0x0, 0x4, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 12:14:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1a, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, r7, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1a, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, r7, 0x0, 0x4, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) 12:14:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x13, 0x0, 0x6, 0x6, 0x462, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@alu={0x4, 0x0, 0xc, 0x6, 0x9, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf0c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x61ad, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xbf, &(0x7f0000000280)=""/191, 0x41000, 0x10, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xb, 0x100, 0x8}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000005c0)=[r12, 0xffffffffffffffff, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff], &(0x7f0000000600)=[{0x4, 0x5, 0xd, 0xc}, {0x0, 0x5, 0x9, 0x2}, {0x2, 0x4, 0xf, 0xc}, {0x5, 0x2, 0xf, 0x2}, {0x5, 0x5, 0x4, 0x5}, {0x2, 0x1, 0xa, 0x8}, {0x4, 0x1, 0x8, 0x2}, {0x4, 0x3, 0xa, 0x7}, {0x4, 0x1, 0xc, 0x3}]}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x13, 0x0, 0x6, 0x6, 0x462, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) (async) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x13, 0x0, 0x6, 0x6, 0x462, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@alu={0x4, 0x0, 0xc, 0x6, 0x9, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf0c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x61ad, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xbf, &(0x7f0000000280)=""/191, 0x41000, 0x10, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xb, 0x100, 0x8}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000005c0)=[r12, 0xffffffffffffffff, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff], &(0x7f0000000600)=[{0x4, 0x5, 0xd, 0xc}, {0x0, 0x5, 0x9, 0x2}, {0x2, 0x4, 0xf, 0xc}, {0x5, 0x2, 0xf, 0x2}, {0x5, 0x5, 0x4, 0x5}, {0x2, 0x1, 0xa, 0x8}, {0x4, 0x1, 0x8, 0x2}, {0x4, 0x3, 0xa, 0x7}, {0x4, 0x1, 0xc, 0x3}]}, 0x90) 12:14:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800000000009504000300130000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) 12:14:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async, rerun: 64) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (rerun: 64) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) (async, rerun: 64) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x13, 0x0, 0x6, 0x6, 0x462, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@alu={0x4, 0x0, 0xc, 0x6, 0x9, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf0c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x61ad, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000100)='GPL\x00', 0x1, 0xbf, &(0x7f0000000280)=""/191, 0x41000, 0x10, '\x00', 0x0, 0x25, r11, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xb, 0x100, 0x8}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000005c0)=[r12, 0xffffffffffffffff, r13, 0xffffffffffffffff, r14, 0xffffffffffffffff], &(0x7f0000000600)=[{0x4, 0x5, 0xd, 0xc}, {0x0, 0x5, 0x9, 0x2}, {0x2, 0x4, 0xf, 0xc}, {0x5, 0x2, 0xf, 0x2}, {0x5, 0x5, 0x4, 0x5}, {0x2, 0x1, 0xa, 0x8}, {0x4, 0x1, 0x8, 0x2}, {0x4, 0x3, 0xa, 0x7}, {0x4, 0x1, 0xc, 0x3}]}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 5: r0 = socket$inet(0x2, 0x4, 0xffff) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @multicast2}, {0x306}, 0x0, {0x2, 0x4e20, @multicast2}, 'pim6reg0\x00'}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 5: r0 = socket$inet(0x2, 0x4, 0xffff) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @multicast2}, {0x306}, 0x0, {0x2, 0x4e20, @multicast2}, 'pim6reg0\x00'}) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:29 executing program 5: r0 = socket$inet(0x2, 0x4, 0xffff) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @multicast2}, {0x306}, 0x0, {0x2, 0x4e20, @multicast2}, 'pim6reg0\x00'}) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x90) 12:14:29 executing program 4: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800001cd52ea3a645e1954131284600cc0e0000000000000002000018012150390bcd96665c26f6b90000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000005b51100010000000c29862fffcffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x40, 0x0, 0x5, {{0x6, 0x4, 0x2, 0xf, 0x18, 0x68, 0x0, 0x1, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x8000, 0x8000, 0x9, 0x3c82f407, {{0x16, 0x4, 0x1, 0x10, 0x58, 0x67, 0x0, 0x5, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x64010102, {[@end, @rr={0x7, 0x17, 0x47, [@dev={0xac, 0x14, 0x14, 0x3c}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2]}, @end, @ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@multicast1, 0x3f}, {@loopback, 0x9}, {@rand_addr=0x64010100, 0xff}]}]}}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f00000002c0)={'sit0\x00', r2, 0x40, 0x1, 0xfffff001, 0xeee, {{0x6, 0x4, 0x0, 0x2a, 0x18, 0x68, 0x0, 0x3b, 0x29, 0x0, @remote, @empty, {[@noop]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, 0x0, &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:29 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) [ 2249.757785][T13873] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2249.769211][T13873] CPU: 0 PID: 13873 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2249.779343][T13873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2249.789406][T13873] Call Trace: [ 2249.792684][T13873] [ 2249.795613][T13873] dump_stack_lvl+0xda/0x130 [ 2249.800206][T13873] dump_stack+0x15/0x20 [ 2249.804370][T13873] dump_header+0x82/0x2d0 [ 2249.808801][T13873] oom_kill_process+0x33a/0x4c0 [ 2249.813669][T13873] out_of_memory+0x9ca/0xbf0 [ 2249.818287][T13873] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2249.824423][T13873] mem_cgroup_out_of_memory+0x139/0x190 [ 2249.830052][T13873] try_charge_memcg+0x759/0xd20 [ 2249.834966][T13873] ? __swap_duplicate+0x29b/0x2b0 [ 2249.840024][T13873] ? radix_tree_lookup+0xf9/0x150 [ 2249.845115][T13873] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2249.851288][T13873] __read_swap_cache_async+0x2b9/0x510 [ 2249.856861][T13873] swap_cluster_readahead+0x276/0x3f0 [ 2249.862249][T13873] swapin_readahead+0xe2/0x7a0 [ 2249.867029][T13873] ? __filemap_get_folio+0x41a/0x5a0 [ 2249.872345][T13873] ? swap_cache_get_folio+0x6e/0x200 [ 2249.877650][T13873] do_swap_page+0x44c/0x1570 [ 2249.882250][T13873] ? __rcu_read_lock+0x35/0x50 [ 2249.887072][T13873] ? pte_offset_map_nolock+0x124/0x1d0 [ 2249.892546][T13873] handle_mm_fault+0x7f6/0x27b0 [ 2249.897407][T13873] ? mas_walk+0x204/0x320 [ 2249.901749][T13873] exc_page_fault+0x3ff/0x6d0 [ 2249.906497][T13873] asm_exc_page_fault+0x26/0x30 [ 2249.911408][T13873] RIP: 0033:0x7f6a5bdee163 [ 2249.915919][T13873] Code: 00 00 00 00 00 66 90 31 c0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 <80> 3d 8e 6d 0d 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 c3 66 2e 0f [ 2249.935581][T13873] RSP: 002b:00007ffd009d4ec8 EFLAGS: 00010293 [ 2249.941716][T13873] RAX: 00000000fffffffa RBX: 00007f6a5bef1f80 RCX: 0000000000000000 [ 2249.949709][T13873] RDX: 00007ffd009d4ee0 RSI: 0000000000000000 RDI: 0000000000000000 [ 2249.957681][T13873] RBP: 00007f6a5bef3980 R08: 0000000000000010 R09: 00007ffd009d70b0 [ 2249.965651][T13873] R10: 0000000000000000 R11: 0000000000069882 R12: 0000000000225517 [ 2249.973747][T13873] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 00000000002251d6 [ 2249.981725][T13873] [ 2249.984868][T13873] memory: usage 307200kB, limit 307200kB, failcnt 18820 [ 2249.991867][T13873] memory+swap: usage 307456kB, limit 9007199254740988kB, failcnt 0 [ 2249.999880][T13873] kmem: usage 307184kB, limit 9007199254740988kB, failcnt 0 [ 2250.007199][T13873] Memory cgroup stats for /syz1: [ 2250.007362][T13873] cache 8192 [ 2250.015562][T13873] rss 4096 [ 2250.018605][T13873] shmem 0 [ 2250.021551][T13873] mapped_file 0 [ 2250.025019][T13873] dirty 8192 [ 2250.028243][T13873] writeback 4096 [ 2250.031778][T13873] workingset_refault_anon 452 [ 2250.036502][T13873] workingset_refault_file 1 [ 2250.041030][T13873] swap 262144 [ 2250.044355][T13873] swapcached 8192 [ 2250.047988][T13873] pgpgin 1657223 [ 2250.051554][T13873] pgpgout 1657219 [ 2250.055196][T13873] pgfault 1274835 [ 2250.058873][T13873] pgmajfault 153 [ 2250.062492][T13873] inactive_anon 0 [ 2250.066149][T13873] active_anon 0 [ 2250.069633][T13873] inactive_file 0 [ 2250.073260][T13873] active_file 8192 [ 2250.077003][T13873] unevictable 0 [ 2250.080463][T13873] hierarchical_memory_limit 314572800 [ 2250.085852][T13873] hierarchical_memsw_limit 9223372036854771712 [ 2250.092114][T13873] total_cache 8192 [ 2250.095845][T13873] total_rss 4096 [ 2250.099387][T13873] total_shmem 0 [ 2250.102890][T13873] total_mapped_file 0 [ 2250.106932][T13873] total_dirty 8192 [ 2250.110649][T13873] total_writeback 4096 [ 2250.114750][T13873] total_workingset_refault_anon 452 [ 2250.120019][T13873] total_workingset_refault_file 1 [ 2250.125050][T13873] total_swap 262144 [ 2250.128851][T13873] total_swapcached 8192 [ 2250.133071][T13873] total_pgpgin 1657223 [ 2250.137156][T13873] total_pgpgout 1657219 [ 2250.141310][T13873] total_pgfault 1274835 [ 2250.145472][T13873] total_pgmajfault 153 [ 2250.149555][T13873] total_inactive_anon 0 [ 2250.153701][T13873] total_active_anon 0 [ 2250.157711][T13873] total_inactive_file 0 [ 2250.161883][T13873] total_active_file 8192 [ 2250.166153][T13873] total_unevictable 0 [ 2250.170131][T13873] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13873,uid=0 [ 2250.185553][T13873] Memory cgroup out of memory: Killed process 13873 (syz-executor.1) total-vm:46440kB, anon-rss:508kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:30 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r10, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r10, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r7, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="2e2fe2046669"]) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r11, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r13, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r13}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r13}}, 0xc) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r14}, 0x90) 12:14:30 executing program 4: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800001cd52ea3a645e1954131284600cc0e0000000000000002000018012150390bcd96665c26f6b90000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000005b51100010000000c29862fffcffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x40, 0x0, 0x5, {{0x6, 0x4, 0x2, 0xf, 0x18, 0x68, 0x0, 0x1, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x8000, 0x8000, 0x9, 0x3c82f407, {{0x16, 0x4, 0x1, 0x10, 0x58, 0x67, 0x0, 0x5, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x64010102, {[@end, @rr={0x7, 0x17, 0x47, [@dev={0xac, 0x14, 0x14, 0x3c}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2]}, @end, @ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@multicast1, 0x3f}, {@loopback, 0x9}, {@rand_addr=0x64010100, 0xff}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x8000, 0x8000, 0x9, 0x3c82f407, {{0x16, 0x4, 0x1, 0x10, 0x58, 0x67, 0x0, 0x5, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x64010102, {[@end, @rr={0x7, 0x17, 0x47, [@dev={0xac, 0x14, 0x14, 0x3c}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2]}, @end, @ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@multicast1, 0x3f}, {@loopback, 0x9}, {@rand_addr=0x64010100, 0xff}]}]}}}}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f00000002c0)={'sit0\x00', r2, 0x40, 0x1, 0xfffff001, 0xeee, {{0x6, 0x4, 0x0, 0x2a, 0x18, 0x68, 0x0, 0x3b, 0x29, 0x0, @remote, @empty, {[@noop]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x90) 12:14:30 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) [ 2250.810372][T13948] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2250.821765][T13948] CPU: 0 PID: 13948 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2250.831892][T13948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2250.842076][T13948] Call Trace: [ 2250.845378][T13948] [ 2250.848359][T13948] dump_stack_lvl+0xda/0x130 [ 2250.853035][T13948] dump_stack+0x15/0x20 [ 2250.857236][T13948] dump_header+0x82/0x2d0 [ 2250.861578][T13948] oom_kill_process+0x33a/0x4c0 [ 2250.866450][T13948] out_of_memory+0x9ca/0xbf0 [ 2250.871055][T13948] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2250.877183][T13948] mem_cgroup_out_of_memory+0x139/0x190 [ 2250.882777][T13948] try_charge_memcg+0x759/0xd20 [ 2250.887713][T13948] ? __swap_duplicate+0x29b/0x2b0 [ 2250.892793][T13948] ? radix_tree_lookup+0xf9/0x150 [ 2250.897846][T13948] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2250.903947][T13948] __read_swap_cache_async+0x2b9/0x510 [ 2250.909433][T13948] swap_cluster_readahead+0x276/0x3f0 [ 2250.914889][T13948] swapin_readahead+0xe2/0x7a0 [ 2250.919740][T13948] ? __filemap_get_folio+0x41a/0x5a0 [ 2250.925040][T13948] ? swap_cache_get_folio+0x6e/0x200 [ 2250.930407][T13948] do_swap_page+0x44c/0x1570 [ 2250.935028][T13948] ? hrtimer_try_to_cancel+0x106/0x1d0 [ 2250.940531][T13948] ? __rcu_read_lock+0x35/0x50 [ 2250.945371][T13948] ? pte_offset_map_nolock+0x124/0x1d0 [ 2250.950872][T13948] handle_mm_fault+0x7f6/0x27b0 [ 2250.955729][T13948] ? mas_walk+0x204/0x320 [ 2250.960139][T13948] exc_page_fault+0x3ff/0x6d0 [ 2250.964846][T13948] asm_exc_page_fault+0x26/0x30 [ 2250.969704][T13948] RIP: 0033:0x7f6a5bd7cda4 [ 2250.974145][T13948] Code: 01 00 00 69 3d 11 e9 c9 00 e8 03 00 00 48 8d 1d f2 51 17 00 e8 9d 5f 04 00 eb 0f 0f 1f 00 48 81 c3 d0 00 00 00 48 39 eb 74 be <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df e8 f7 ee ff ff eb [ 2250.993830][T13948] RSP: 002b:00007ffd009d4f10 EFLAGS: 00010202 [ 2250.999905][T13948] RAX: 0000000000000000 RBX: 00007f6a5bef1f80 RCX: 0000000000000000 [ 2251.007908][T13948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555556c34788 [ 2251.015876][T13948] RBP: 00007f6a5bef3980 R08: 0000000000000000 R09: 00007ffd009d70b0 [ 2251.023894][T13948] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002259e3 [ 2251.031876][T13948] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 00000000002256a2 [ 2251.039921][T13948] [ 2251.043013][T13948] memory: usage 307192kB, limit 307200kB, failcnt 19277 [ 2251.049978][T13948] memory+swap: usage 307500kB, limit 9007199254740988kB, failcnt 0 [ 2251.057939][T13948] kmem: usage 307164kB, limit 9007199254740988kB, failcnt 0 [ 2251.065253][T13948] Memory cgroup stats for /syz1: [ 2251.065439][T13948] cache 8192 [ 2251.073570][T13948] rss 8192 [ 2251.076634][T13948] shmem 0 [ 2251.079580][T13948] mapped_file 0 [ 2251.083052][T13948] dirty 8192 [ 2251.086390][T13948] writeback 8192 [ 2251.089981][T13948] workingset_refault_anon 477 [ 2251.094702][T13948] workingset_refault_file 1 [ 2251.099205][T13948] swap 315392 [ 2251.102481][T13948] swapcached 20480 [ 2251.106299][T13948] pgpgin 1657275 [ 2251.109883][T13948] pgpgout 1657268 [ 2251.113540][T13948] pgfault 1274961 [ 2251.117277][T13948] pgmajfault 161 [ 2251.120898][T13948] inactive_anon 0 [ 2251.124588][T13948] active_anon 0 [ 2251.128089][T13948] inactive_file 0 [ 2251.131729][T13948] active_file 8192 [ 2251.135472][T13948] unevictable 0 [ 2251.138991][T13948] hierarchical_memory_limit 314572800 [ 2251.144442][T13948] hierarchical_memsw_limit 9223372036854771712 [ 2251.150606][T13948] total_cache 8192 [ 2251.154364][T13948] total_rss 8192 [ 2251.157950][T13948] total_shmem 0 [ 2251.161530][T13948] total_mapped_file 0 [ 2251.165559][T13948] total_dirty 8192 [ 2251.169329][T13948] total_writeback 8192 [ 2251.173440][T13948] total_workingset_refault_anon 477 [ 2251.178683][T13948] total_workingset_refault_file 1 [ 2251.183737][T13948] total_swap 315392 [ 2251.187686][T13948] total_swapcached 20480 [ 2251.191979][T13948] total_pgpgin 1657275 [ 2251.196107][T13948] total_pgpgout 1657268 [ 2251.200313][T13948] total_pgfault 1274961 [ 2251.204480][T13948] total_pgmajfault 161 [ 2251.208560][T13948] total_inactive_anon 0 [ 2251.212703][T13948] total_active_anon 0 [ 2251.216728][T13948] total_inactive_file 0 [ 2251.220950][T13948] total_active_file 8192 [ 2251.225201][T13948] total_unevictable 0 [ 2251.229181][T13948] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13948,uid=0 [ 2251.244512][T13948] Memory cgroup out of memory: Killed process 13948 (syz-executor.1) total-vm:46440kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) (async) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) (async) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r10, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r10, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r7, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="2e2fe2046669"]) (async) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r11, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r13, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r13}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r13}}, 0xc) (async) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r14}, 0x90) 12:14:31 executing program 4: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x11, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800001cd52ea3a645e1954131284600cc0e0000000000000002000018012150390bcd96665c26f6b90000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000005b51100010000000c29862fffcffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x40, 0x0, 0x5, {{0x6, 0x4, 0x2, 0xf, 0x18, 0x68, 0x0, 0x1, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x8000, 0x8000, 0x9, 0x3c82f407, {{0x16, 0x4, 0x1, 0x10, 0x58, 0x67, 0x0, 0x5, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x64010102, {[@end, @rr={0x7, 0x17, 0x47, [@dev={0xac, 0x14, 0x14, 0x3c}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2]}, @end, @ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7}, {@multicast1, 0x3f}, {@loopback, 0x9}, {@rand_addr=0x64010100, 0xff}]}]}}}}}) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000300)={'syztnl0\x00', &(0x7f00000002c0)={'sit0\x00', r2, 0x40, 0x1, 0xfffff001, 0xeee, {{0x6, 0x4, 0x0, 0x2a, 0x18, 0x68, 0x0, 0x3b, 0x29, 0x0, @remote, @empty, {[@noop]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 0: syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = getpgrp(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) ioctl$BINDER_GET_FROZEN_INFO(r7, 0xc00c620f, &(0x7f0000000000)={r0}) 12:14:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 12:14:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x1, 0xf6, 0xa16}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 64) r1 = socket$nl_audit(0x10, 0x3, 0x9) (rerun: 64) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) (async, rerun: 64) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (rerun: 64) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) (async) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) (async) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r7, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r10, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async, rerun: 32) accept4$bt_l2cap(r10, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r7, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="2e2fe2046669"]) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r11, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r13, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r13}}, 0xc) (rerun: 64) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r13}}, 0xc) (async, rerun: 64) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r14}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 0: syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = getpgrp(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$BINDER_GET_FROZEN_INFO(r7, 0xc00c620f, &(0x7f0000000000)={r0}) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x1, 0x80000001, 0x550, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3, 0xf}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x3c, 0x3e9, 0x800, 0x70bd25, 0x25dfdbfd, {0x10, 0x0, 0x0, 0x0, 0x5, 0x7, 0x9, 0x1, 0x0, 0x80000001, 0x8100}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4002050) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80), &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x3, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x21, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x6, 0x1, 0x0, r9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x456, 0x4f, &(0x7f0000000580)=""/79, 0x911df7a12ecbc73b, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xd, 0x0, 0x3}, 0x10, 0x1cfcf, r0, 0x1, &(0x7f0000000680)=[r13, r1, r8, r1, r9, r1, r16], &(0x7f00000006c0)=[{0x4, 0x2, 0x10, 0x6}], 0x10, 0x2}, 0x90) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r8, 0x89f9, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000100)={@private2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xe, 0xc}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x9, 0x3, 0xdfc3, 0x850, r1, 0x1f, '\x00', r2, r8, 0x4, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7deebbf00741800"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) 12:14:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x1, 0x80000001, 0x550, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3, 0xf}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x3c, 0x3e9, 0x800, 0x70bd25, 0x25dfdbfd, {0x10, 0x0, 0x0, 0x0, 0x5, 0x7, 0x9, 0x1, 0x0, 0x80000001, 0x8100}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4002050) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80), &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x3, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x21, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x6, 0x1, 0x0, r9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x456, 0x4f, &(0x7f0000000580)=""/79, 0x911df7a12ecbc73b, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xd, 0x0, 0x3}, 0x10, 0x1cfcf, r0, 0x1, &(0x7f0000000680)=[r13, r1, r8, r1, r9, r1, r16], &(0x7f00000006c0)=[{0x4, 0x2, 0x10, 0x6}], 0x10, 0x2}, 0x90) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r8, 0x89f9, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000100)={@private2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xe, 0xc}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x9, 0x3, 0xdfc3, 0x850, r1, 0x1f, '\x00', r2, r8, 0x4, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:31 executing program 0: syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = getpgrp(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) ioctl$BINDER_GET_FROZEN_INFO(r7, 0xc00c620f, &(0x7f0000000000)={r0}) syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) gettid() (async) getpgrp(r0) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$BINDER_GET_FROZEN_INFO(r7, 0xc00c620f, &(0x7f0000000000)={r0}) (async) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7, 0x1, 0x80000001, 0x550, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3, 0xf}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) (async) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x3c, 0x3e9, 0x800, 0x70bd25, 0x25dfdbfd, {0x10, 0x0, 0x0, 0x0, 0x5, 0x7, 0x9, 0x1, 0x0, 0x80000001, 0x8100}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4002050) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async, rerun: 32) r5 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80), &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x3, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r14 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r14, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x21, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x6, 0x1, 0x0, r9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x456, 0x4f, &(0x7f0000000580)=""/79, 0x911df7a12ecbc73b, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0xd, 0x0, 0x3}, 0x10, 0x1cfcf, r0, 0x1, &(0x7f0000000680)=[r13, r1, r8, r1, r9, r1, r16], &(0x7f00000006c0)=[{0x4, 0x2, 0x10, 0x6}], 0x10, 0x2}, 0x90) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r8, 0x89f9, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000100)={@private2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xe, 0xc}}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x13, 0x9, 0x3, 0xdfc3, 0x850, r1, 0x1f, '\x00', r2, r8, 0x4, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r8, &(0x7f0000000340)="1066d5c570e05e0b3e8809161b0f9e1a1c8b28107fb6df1a509bafc5a183382052eac07de7075c4256f59f1b6abfa8bb1426929967d0bece08db751e98e007dd5f3f4310d84fb856954d21c597aa9d61cf37e664e7ce8fe1971847fc35", &(0x7f00000003c0)=@tcp=r8, 0x1}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r11, 0x0, 0x483, &(0x7f0000000300)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'wrr\x00', 0x1, 0x400, 0x4e}, 0x2c) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@timestamp={0x44, 0x8, 0x70, 0x0, 0x5, [0x4]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f0000000480)=@ipv4_newroute={0x90, 0x18, 0x800, 0x70bd26, 0x25dfdbfd, {0x2, 0x20, 0x20, 0x9, 0xff, 0x1, 0xff, 0x1, 0x2100}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_METRICS={0x47, 0x8, 0x0, 0x1, "67d36f78e11e5ab91a7102634c760fe037cbb7af41abe87439cde4994302085c3cef64542fb152d9c7d07ddbb863d4e13291e2bf89024fc5fa6995b4aa436daf97ecdd"}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x4, 0x46}}, @RTA_UID={0x8, 0x19, r12}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x11}}]}, 0x90}}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="1832000005000000000000000000000009000000000000000000000000000000185600000900"/48], &(0x7f0000000040)='syzkaller\x00', 0x200, 0x27, &(0x7f0000000080)=""/39, 0x40f00, 0x1, '\x00', r2, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[r15, r16, 0x1], &(0x7f00000001c0)=[{0x3, 0x4, 0x6, 0x2}, {0x1, 0x1, 0x1, 0xa}, {0x1, 0x2, 0x9, 0x1}], 0x10, 0x80000000}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b2704c7de"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r8, &(0x7f0000000340)="1066d5c570e05e0b3e8809161b0f9e1a1c8b28107fb6df1a509bafc5a183382052eac07de7075c4256f59f1b6abfa8bb1426929967d0bece08db751e98e007dd5f3f4310d84fb856954d21c597aa9d61cf37e664e7ce8fe1971847fc35", &(0x7f00000003c0)=@tcp=r8, 0x1}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r11, 0x0, 0x483, &(0x7f0000000300)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'wrr\x00', 0x1, 0x400, 0x4e}, 0x2c) (async) setsockopt$IP_VS_SO_SET_EDIT(r11, 0x0, 0x483, &(0x7f0000000300)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'wrr\x00', 0x1, 0x400, 0x4e}, 0x2c) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@timestamp={0x44, 0x8, 0x70, 0x0, 0x5, [0x4]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) (async) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) socket$nl_route(0x10, 0x3, 0x0) (async) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f0000000480)=@ipv4_newroute={0x90, 0x18, 0x800, 0x70bd26, 0x25dfdbfd, {0x2, 0x20, 0x20, 0x9, 0xff, 0x1, 0xff, 0x1, 0x2100}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_METRICS={0x47, 0x8, 0x0, 0x1, "67d36f78e11e5ab91a7102634c760fe037cbb7af41abe87439cde4994302085c3cef64542fb152d9c7d07ddbb863d4e13291e2bf89024fc5fa6995b4aa436daf97ecdd"}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x4, 0x46}}, @RTA_UID={0x8, 0x19, r12}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x11}}]}, 0x90}}, 0x20000000) (async) sendmsg$nl_route(r17, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f0000000480)=@ipv4_newroute={0x90, 0x18, 0x800, 0x70bd26, 0x25dfdbfd, {0x2, 0x20, 0x20, 0x9, 0xff, 0x1, 0xff, 0x1, 0x2100}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_METRICS={0x47, 0x8, 0x0, 0x1, "67d36f78e11e5ab91a7102634c760fe037cbb7af41abe87439cde4994302085c3cef64542fb152d9c7d07ddbb863d4e13291e2bf89024fc5fa6995b4aa436daf97ecdd"}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x4, 0x46}}, @RTA_UID={0x8, 0x19, r12}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x11}}]}, 0x90}}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="1832000005000000000000000000000009000000000000000000000000000000185600000900"/48], &(0x7f0000000040)='syzkaller\x00', 0x200, 0x27, &(0x7f0000000080)=""/39, 0x40f00, 0x1, '\x00', r2, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[r15, r16, 0x1], &(0x7f00000001c0)=[{0x3, 0x4, 0x6, 0x2}, {0x1, 0x1, 0x1, 0xa}, {0x1, 0x2, 0x9, 0x1}], 0x10, 0x80000000}, 0x90) 12:14:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) (async) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r8, &(0x7f0000000340)="1066d5c570e05e0b3e8809161b0f9e1a1c8b28107fb6df1a509bafc5a183382052eac07de7075c4256f59f1b6abfa8bb1426929967d0bece08db751e98e007dd5f3f4310d84fb856954d21c597aa9d61cf37e664e7ce8fe1971847fc35", &(0x7f00000003c0)=@tcp=r8, 0x1}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$IP_VS_SO_SET_EDIT(r11, 0x0, 0x483, &(0x7f0000000300)={0x2b, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2, 'wrr\x00', 0x1, 0x400, 0x4e}, 0x2c) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x13, 0x4, 0x1, 0x2, 0x4c, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@timestamp={0x44, 0x8, 0x70, 0x0, 0x5, [0x4]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) (async) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f0000000480)=@ipv4_newroute={0x90, 0x18, 0x800, 0x70bd26, 0x25dfdbfd, {0x2, 0x20, 0x20, 0x9, 0xff, 0x1, 0xff, 0x1, 0x2100}, [@RTA_SRC={0x8, 0x2, @multicast2}, @RTA_METRICS={0x47, 0x8, 0x0, 0x1, "67d36f78e11e5ab91a7102634c760fe037cbb7af41abe87439cde4994302085c3cef64542fb152d9c7d07ddbb863d4e13291e2bf89024fc5fa6995b4aa436daf97ecdd"}, @RTA_PREFSRC={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWT_BPF_XMIT_HEADROOM={0x8, 0x4, 0x46}}, @RTA_UID={0x8, 0x19, r12}, @RTA_DST={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x11}}]}, 0x90}}, 0x20000000) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="1832000005000000000000000000000009000000000000000000000000000000185600000900"/48], &(0x7f0000000040)='syzkaller\x00', 0x200, 0x27, &(0x7f0000000080)=""/39, 0x40f00, 0x1, '\x00', r2, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[r15, r16, 0x1], &(0x7f00000001c0)=[{0x3, 0x4, 0x6, 0x2}, {0x1, 0x1, 0x1, 0xa}, {0x1, 0x2, 0x9, 0x1}], 0x10, 0x80000000}, 0x90) 12:14:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12:14:32 executing program 0: r0 = syz_clone(0xb38e8200, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom0\x00', 0x802, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r1, 0xc00c620f, &(0x7f0000000040)={r0}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100, 0x3}) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x7, 0x20, 0x3, 0x7, {{0x33, 0x4, 0x2, 0x6, 0xcc, 0x67, 0x0, 0x2, 0x29, 0x0, @remote, @empty, {[@ssrr={0x89, 0x17, 0x4e, [@loopback, @private=0xa010101, @multicast2, @remote, @empty]}, @cipso={0x86, 0x49, 0x0, [{0x7, 0x10, "67c2edabdbecc74d145c63beb535"}, {0x6, 0x6, "8688f53f"}, {0x0, 0x6, "7a6f65c7"}, {0x7, 0x3, 'h'}, {0x0, 0x6, "787359ff"}, {0x2, 0x2}, {0x0, 0x2}, {0x1, 0xb, "3b229fafa701be229c"}, {0x1, 0xf, "a9672455b1c0dc82d29e09af23"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x1, 0xc, "afde8787e73db6e2ff38"}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x40, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xec}, {@multicast2, 0x1}, {@local, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x9}, {@local, 0x6}, {@broadcast, 0xfffffffd}, {@empty, 0x4}]}]}}}}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x87d, '\x00', r4, r13, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x1c, &(0x7f0000000300)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1a, &(0x7f0000000000)="39a08c07c698b84c8f914459e482f32a080b77695b4a66b471bde848921092c99bfd48ea1f9e124f0c9c4f25b6dcc49450845793091c521342ad015b8865564cb1e4962114f688c9bc1b50622d19a0a48c13c19d5045a19baa48845c4dbac12dc64270fe", 0x64) 12:14:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async, rerun: 32) r3 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async, rerun: 64) r10 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async, rerun: 64) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x87d, '\x00', r4, r13, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x1c, &(0x7f0000000300)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) (async, rerun: 32) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1a, &(0x7f0000000000)="39a08c07c698b84c8f914459e482f32a080b77695b4a66b471bde848921092c99bfd48ea1f9e124f0c9c4f25b6dcc49450845793091c521342ad015b8865564cb1e4962114f688c9bc1b50622d19a0a48c13c19d5045a19baa48845c4dbac12dc64270fe", 0x64) (rerun: 32) 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12:14:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x7, 0x20, 0x3, 0x7, {{0x33, 0x4, 0x2, 0x6, 0xcc, 0x67, 0x0, 0x2, 0x29, 0x0, @remote, @empty, {[@ssrr={0x89, 0x17, 0x4e, [@loopback, @private=0xa010101, @multicast2, @remote, @empty]}, @cipso={0x86, 0x49, 0x0, [{0x7, 0x10, "67c2edabdbecc74d145c63beb535"}, {0x6, 0x6, "8688f53f"}, {0x0, 0x6, "7a6f65c7"}, {0x7, 0x3, 'h'}, {0x0, 0x6, "787359ff"}, {0x2, 0x2}, {0x0, 0x2}, {0x1, 0xb, "3b229fafa701be229c"}, {0x1, 0xf, "a9672455b1c0dc82d29e09af23"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x1, 0xc, "afde8787e73db6e2ff38"}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x40, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xec}, {@multicast2, 0x1}, {@local, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x9}, {@local, 0x6}, {@broadcast, 0xfffffffd}, {@empty, 0x4}]}]}}}}}) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 12:14:32 executing program 0: r0 = syz_clone(0xb38e8200, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom0\x00', 0x802, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r1, 0xc00c620f, &(0x7f0000000040)={r0}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100, 0x3}) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b27"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000040)={'ip_vti0\x00', r1, 0x7, 0x20, 0x3, 0x7, {{0x33, 0x4, 0x2, 0x6, 0xcc, 0x67, 0x0, 0x2, 0x29, 0x0, @remote, @empty, {[@ssrr={0x89, 0x17, 0x4e, [@loopback, @private=0xa010101, @multicast2, @remote, @empty]}, @cipso={0x86, 0x49, 0x0, [{0x7, 0x10, "67c2edabdbecc74d145c63beb535"}, {0x6, 0x6, "8688f53f"}, {0x0, 0x6, "7a6f65c7"}, {0x7, 0x3, 'h'}, {0x0, 0x6, "787359ff"}, {0x2, 0x2}, {0x0, 0x2}, {0x1, 0xb, "3b229fafa701be229c"}, {0x1, 0xf, "a9672455b1c0dc82d29e09af23"}]}, @noop, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x12, 0xffffffffffffffff, [{0x1, 0xc, "afde8787e73db6e2ff38"}]}, @end, @timestamp_prespec={0x44, 0x3c, 0x40, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xec}, {@multicast2, 0x1}, {@local, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x2f}, 0x9}, {@local, 0x6}, {@broadcast, 0xfffffffd}, {@empty, 0x4}]}]}}}}}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) [ 2252.218825][ T3080] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2252.229989][ T3080] CPU: 0 PID: 3080 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2252.240084][ T3080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2252.250154][ T3080] Call Trace: [ 2252.253449][ T3080] [ 2252.256394][ T3080] dump_stack_lvl+0xda/0x130 [ 2252.261002][ T3080] dump_stack+0x15/0x20 [ 2252.265320][ T3080] dump_header+0x82/0x2d0 [ 2252.269678][ T3080] oom_kill_process+0x33a/0x4c0 [ 2252.274600][ T3080] out_of_memory+0x9ca/0xbf0 [ 2252.279221][ T3080] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2252.285343][ T3080] mem_cgroup_out_of_memory+0x139/0x190 [ 2252.290931][ T3080] try_charge_memcg+0x759/0xd20 [ 2252.295873][ T3080] ? __swap_duplicate+0x29b/0x2b0 [ 2252.300929][ T3080] ? radix_tree_lookup+0xf9/0x150 [ 2252.306050][ T3080] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2252.312228][ T3080] __read_swap_cache_async+0x2b9/0x510 [ 2252.317707][ T3080] swap_cluster_readahead+0x276/0x3f0 [ 2252.323175][ T3080] swapin_readahead+0xe2/0x7a0 [ 2252.327949][ T3080] ? __filemap_get_folio+0x41a/0x5a0 [ 2252.333342][ T3080] ? swap_cache_get_folio+0x6e/0x200 [ 2252.338720][ T3080] do_swap_page+0x44c/0x1570 [ 2252.343441][ T3080] ? __rcu_read_lock+0x35/0x50 [ 2252.348238][ T3080] ? pte_offset_map_nolock+0x124/0x1d0 [ 2252.353718][ T3080] handle_mm_fault+0x7f6/0x27b0 [ 2252.358748][ T3080] ? mas_walk+0x204/0x320 [ 2252.363230][ T3080] exc_page_fault+0x3ff/0x6d0 [ 2252.368011][ T3080] asm_exc_page_fault+0x26/0x30 [ 2252.372887][ T3080] RIP: 0033:0x7f6a5bdee175 [ 2252.377312][ T3080] Code: 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d 8e 6d 0d 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 89 74 [ 2252.397033][ T3080] RSP: 002b:00007ffd009d50f8 EFLAGS: 00010246 [ 2252.403191][ T3080] RAX: 0000000000000000 RBX: 0000000000004ecc RCX: 00007f6a5bdee173 [ 2252.411167][ T3080] RDX: 00007ffd009d5110 RSI: 0000000000000000 RDI: 0000000000000000 [ 2252.419285][ T3080] RBP: 00007ffd009d519c R08: 0000000000000010 R09: 00007ffd009d70b0 [ 2252.427337][ T3080] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 2252.435381][ T3080] R13: 0000000000225b7b R14: 0000000000225b24 R15: 000000000000000a [ 2252.443431][ T3080] [ 2252.446665][ T3080] memory: usage 8480kB, limit 307200kB, failcnt 19497 [ 2252.453461][ T3080] memory+swap: usage 8788kB, limit 9007199254740988kB, failcnt 0 [ 2252.461414][ T3080] kmem: usage 8468kB, limit 9007199254740988kB, failcnt 0 [ 2252.468690][ T3080] Memory cgroup stats for /syz1: [ 2252.468881][ T3080] cache 4096 [ 2252.477074][ T3080] rss 4096 [ 2252.480103][ T3080] shmem 0 [ 2252.483051][ T3080] mapped_file 0 [ 2252.486587][ T3080] dirty 0 [ 2252.489533][ T3080] writeback 0 [ 2252.492822][ T3080] workingset_refault_anon 501 [ 2252.497579][ T3080] workingset_refault_file 1 [ 2252.502098][ T3080] swap 315392 [ 2252.505417][ T3080] swapcached 4096 [ 2252.509061][ T3080] pgpgin 1657326 [ 2252.512680][ T3080] pgpgout 1657324 [ 2252.516334][ T3080] pgfault 1275145 [ 2252.519973][ T3080] pgmajfault 169 [ 2252.523522][ T3080] inactive_anon 4096 [ 2252.527433][ T3080] active_anon 0 [ 2252.531003][ T3080] inactive_file 0 [ 2252.534671][ T3080] active_file 4096 [ 2252.538394][ T3080] unevictable 0 [ 2252.541853][ T3080] hierarchical_memory_limit 314572800 [ 2252.547244][ T3080] hierarchical_memsw_limit 9223372036854771712 [ 2252.553403][ T3080] total_cache 4096 [ 2252.557153][ T3080] total_rss 4096 [ 2252.560730][ T3080] total_shmem 0 [ 2252.564193][ T3080] total_mapped_file 0 [ 2252.568260][ T3080] total_dirty 0 [ 2252.571791][ T3080] total_writeback 0 [ 2252.575822][ T3080] total_workingset_refault_anon 501 [ 2252.581035][ T3080] total_workingset_refault_file 1 [ 2252.586128][ T3080] total_swap 315392 [ 2252.589943][ T3080] total_swapcached 4096 [ 2252.594102][ T3080] total_pgpgin 1657326 [ 2252.598273][ T3080] total_pgpgout 1657324 [ 2252.602439][ T3080] total_pgfault 1275145 [ 2252.606714][ T3080] total_pgmajfault 169 [ 2252.610834][ T3080] total_inactive_anon 4096 [ 2252.615273][ T3080] total_active_anon 0 12:14:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x87d, '\x00', r4, r13, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x1c, &(0x7f0000000300)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1a, &(0x7f0000000000)="39a08c07c698b84c8f914459e482f32a080b77695b4a66b471bde848921092c99bfd48ea1f9e124f0c9c4f25b6dcc49450845793091c521342ad015b8865564cb1e4962114f688c9bc1b50622d19a0a48c13c19d5045a19baa48845c4dbac12dc64270fe", 0x64) (async) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1a, &(0x7f0000000000)="39a08c07c698b84c8f914459e482f32a080b77695b4a66b471bde848921092c99bfd48ea1f9e124f0c9c4f25b6dcc49450845793091c521342ad015b8865564cb1e4962114f688c9bc1b50622d19a0a48c13c19d5045a19baa48845c4dbac12dc64270fe", 0x64) 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x200, 0xfe, &(0x7f0000000180)=""/254, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x9049, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000280)=[r1, r1, r1, r4], &(0x7f00000002c0)=[{0x2, 0x5, 0xf, 0x2}, {0x0, 0x1, 0x5, 0x7}, {0x3, 0x3, 0xf, 0x6}, {0x5, 0x2, 0x2, 0x8}, {0x2, 0x2, 0x0, 0x7}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x100, 0x14, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, r0}, 0x90) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:32 executing program 0: r0 = syz_clone(0xb38e8200, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom0\x00', 0x802, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r1, 0xc00c620f, &(0x7f0000000040)={r0}) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1100, 0x3}) 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) [ 2252.619268][ T3080] total_inactive_file 0 [ 2252.623436][ T3080] total_active_file 4096 [ 2252.627721][ T3080] total_unevictable 0 [ 2252.631714][ T3080] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14002,uid=0 [ 2252.647102][ T3080] Memory cgroup out of memory: OOM victim 14002 (syz-executor.1) is already exiting. Skip killing the task 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x200, 0xfe, &(0x7f0000000180)=""/254, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x9049, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000280)=[r1, r1, r1, r4], &(0x7f00000002c0)=[{0x2, 0x5, 0xf, 0x2}, {0x0, 0x1, 0x5, 0x7}, {0x3, 0x3, 0xf, 0x6}, {0x5, 0x2, 0x2, 0x8}, {0x2, 0x2, 0x0, 0x7}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x100, 0x14, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, r0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x200, 0xfe, &(0x7f0000000180)=""/254, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x9049, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000280)=[r1, r1, r1, r4], &(0x7f00000002c0)=[{0x2, 0x5, 0xf, 0x2}, {0x0, 0x1, 0x5, 0x7}, {0x3, 0x3, 0xf, 0x6}, {0x5, 0x2, 0x2, 0x8}, {0x2, 0x2, 0x0, 0x7}], 0x10, 0x7}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x100, 0x14, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, r0}, 0x90) (async) 12:14:32 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) r1 = getpgrp(r0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(r2, 0x0) r4 = syz_open_procfs(r2, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000040), 0x4003) gettid() r5 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000000c0)={0x89, @local, 0x4e22, 0x4, 'sh\x00', 0x20, 0x4, 0x6b}, 0x2c) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000080), 0x4003) gettid() r6 = shmget(0x3, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x0}}, './file0\x00'}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r4, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x3, r7, r8, 0xee01, r9, 0x104, 0x5}, 0x5, 0x800, 0x9, 0x0, r2, r2, 0x21}) 12:14:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x200, 0xfe, &(0x7f0000000180)=""/254, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x9049, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000280)=[r1, r1, r1, r4], &(0x7f00000002c0)=[{0x2, 0x5, 0xf, 0x2}, {0x0, 0x1, 0x5, 0x7}, {0x3, 0x3, 0xf, 0x6}, {0x5, 0x2, 0x2, 0x8}, {0x2, 0x2, 0x0, 0x7}], 0x10, 0x7}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x200, 0xfe, &(0x7f0000000180)=""/254, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x9049, 0x6}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000280)=[r1, r1, r1, r4], &(0x7f00000002c0)=[{0x2, 0x5, 0xf, 0x2}, {0x0, 0x1, 0x5, 0x7}, {0x3, 0x3, 0xf, 0x6}, {0x5, 0x2, 0x2, 0x8}, {0x2, 0x2, 0x0, 0x7}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x100, 0x14, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, r0}, 0x90) 12:14:32 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @private=0xa010101, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r5, 0x0) syz_open_procfs(r5, 0x0) sendmsg$AUDIT_SET(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, 0x3e9, 0x4, 0x70bd29, 0x25dfdbff, {0x40, 0x1, 0x0, r5, 0x8, 0xb90, 0x23c3e635, 0xd459, 0x0, 0x7, 0xff}, ["", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4085}, 0x4000000) r6 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x340, 0xffffffff, 0xb8, 0xb8, 0x1b0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x3373}}}, {{@ip={@multicast1, @private=0xa010101, 0xff000000, 0xffff00, 'pimreg1\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0x1, 0x0, 0x14}, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@set={{0x40}, {{0x1, [0x0, 0x0, 0x6, 0x1, 0x4, 0x1], 0x0, 0x2}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'veth0_to_team\x00', {0x63}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xff000000, 'wg0\x00', 'pim6reg\x00', {0xff}, {0xff}, 0x8, 0x0, 0x26}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x10, "06b4"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x3ff, 0x1, [0x3, 0x32, 0x6, 0x6, 0x32, 0x1, 0x25, 0x1, 0x3c, 0x29, 0x1f, 0x1e, 0x30, 0x11, 0x3, 0x3], 0x2, 0xbdb0, 0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="a8e7e985549c17601c0ed5caa770bcd2a8662543f43803cac4bf1579168f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x83}, @alu={0x7, 0x0, 0x3, 0x6, 0x3, 0xfffffffffffffffe, 0x5969d75a3d7a30e7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001e40)='GPL\x00', 0xfffffffe}, 0x90) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000003c0)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x3, 0xffffffffffffffff, 0x28, 0x1, @in6={0xa, 0x4e22, 0x322, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x1f}}}, 0xa0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095007ab2e843c64c"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r10}, 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r11, 0x0, 0x28, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @empty}, 0xc) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x1, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x1, 0x7808, 0x1000, 0x100, {{0x35, 0x4, 0x2, 0x20, 0xd4, 0x68, 0x0, 0x4, 0x29, 0x0, @local, @multicast2, {[@timestamp_addr={0x44, 0xc, 0x26, 0x1, 0x5, [{@remote, 0x7fff}]}, @ssrr={0x89, 0x1b, 0x9a, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x36}]}, @generic={0x5, 0x2}, @cipso={0x86, 0x21, 0x3, [{0x6, 0xc, "ed68451b4570db7eef90"}, {0x6, 0xf, "1ba2cbb8c7a6c0a74ce239bdb0"}]}, @noop, @timestamp_prespec={0x44, 0x34, 0xa2, 0x3, 0xb, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x30000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x36500a29}, {@multicast2, 0x4602}, {@multicast1, 0x101}, {@remote, 0xc63}, {@loopback, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xd7, 0x3, 0x3, [{@private=0xa010101, 0x20}]}, @generic={0x88, 0x11, "45f2aca9e140dfb5bb834f882b1577"}, @timestamp_prespec={0x44, 0x24, 0xc7, 0x3, 0xc, [{@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4}, {@loopback, 0x1}, {@rand_addr=0x64010101, 0x80000001}]}]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x8f}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x20, 0x0, 0x0, 0x40f00, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x7}, 0x10, 0x28a7c, r1, 0x7, 0x0, &(0x7f00000002c0)=[{0x5, 0x1, 0x3, 0xa}, {0x5, 0x1, 0x4, 0x8}, {0x3, 0x3, 0xf, 0xb}, {0x2, 0x4, 0x7, 0x8}, {0x2, 0x3, 0xa, 0x4}, {0x0, 0x3, 0x10, 0x8}, {0x4, 0x10001, 0xb}], 0x10, 0x6}, 0x90) 12:14:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="863b"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x1, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x1, 0x7808, 0x1000, 0x100, {{0x35, 0x4, 0x2, 0x20, 0xd4, 0x68, 0x0, 0x4, 0x29, 0x0, @local, @multicast2, {[@timestamp_addr={0x44, 0xc, 0x26, 0x1, 0x5, [{@remote, 0x7fff}]}, @ssrr={0x89, 0x1b, 0x9a, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x36}]}, @generic={0x5, 0x2}, @cipso={0x86, 0x21, 0x3, [{0x6, 0xc, "ed68451b4570db7eef90"}, {0x6, 0xf, "1ba2cbb8c7a6c0a74ce239bdb0"}]}, @noop, @timestamp_prespec={0x44, 0x34, 0xa2, 0x3, 0xb, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x30000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x36500a29}, {@multicast2, 0x4602}, {@multicast1, 0x101}, {@remote, 0xc63}, {@loopback, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xd7, 0x3, 0x3, [{@private=0xa010101, 0x20}]}, @generic={0x88, 0x11, "45f2aca9e140dfb5bb834f882b1577"}, @timestamp_prespec={0x44, 0x24, 0xc7, 0x3, 0xc, [{@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4}, {@loopback, 0x1}, {@rand_addr=0x64010101, 0x80000001}]}]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x8f}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x20, 0x0, 0x0, 0x40f00, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x7}, 0x10, 0x28a7c, r1, 0x7, 0x0, &(0x7f00000002c0)=[{0x5, 0x1, 0x3, 0xa}, {0x5, 0x1, 0x4, 0x8}, {0x3, 0x3, 0xf, 0xb}, {0x2, 0x4, 0x7, 0x8}, {0x2, 0x3, 0xa, 0x4}, {0x0, 0x3, 0x10, 0x8}, {0x4, 0x10001, 0xb}], 0x10, 0x6}, 0x90) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r4], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x1, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x1, 0x7808, 0x1000, 0x100, {{0x35, 0x4, 0x2, 0x20, 0xd4, 0x68, 0x0, 0x4, 0x29, 0x0, @local, @multicast2, {[@timestamp_addr={0x44, 0xc, 0x26, 0x1, 0x5, [{@remote, 0x7fff}]}, @ssrr={0x89, 0x1b, 0x9a, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x36}]}, @generic={0x5, 0x2}, @cipso={0x86, 0x21, 0x3, [{0x6, 0xc, "ed68451b4570db7eef90"}, {0x6, 0xf, "1ba2cbb8c7a6c0a74ce239bdb0"}]}, @noop, @timestamp_prespec={0x44, 0x34, 0xa2, 0x3, 0xb, [{@dev={0xac, 0x14, 0x14, 0x10}, 0x30000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x36500a29}, {@multicast2, 0x4602}, {@multicast1, 0x101}, {@remote, 0xc63}, {@loopback, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xd7, 0x3, 0x3, [{@private=0xa010101, 0x20}]}, @generic={0x88, 0x11, "45f2aca9e140dfb5bb834f882b1577"}, @timestamp_prespec={0x44, 0x24, 0xc7, 0x3, 0xc, [{@local, 0x3}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4}, {@loopback, 0x1}, {@rand_addr=0x64010101, 0x80000001}]}]}}}}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x8f}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x20, 0x0, 0x0, 0x40f00, 0x2, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xd, 0x7}, 0x10, 0x28a7c, r1, 0x7, 0x0, &(0x7f00000002c0)=[{0x5, 0x1, 0x3, 0xa}, {0x5, 0x1, 0x4, 0x8}, {0x3, 0x3, 0xf, 0xb}, {0x2, 0x4, 0x7, 0x8}, {0x2, 0x3, 0xa, 0x4}, {0x0, 0x3, 0x10, 0x8}, {0x4, 0x10001, 0xb}], 0x10, 0x6}, 0x90) 12:14:33 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @private=0xa010101, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) (async) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r5, 0x0) (async) syz_open_procfs(r5, 0x0) syz_open_procfs(r5, 0x0) (async) syz_open_procfs(r5, 0x0) sendmsg$AUDIT_SET(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, 0x3e9, 0x4, 0x70bd29, 0x25dfdbff, {0x40, 0x1, 0x0, r5, 0x8, 0xb90, 0x23c3e635, 0xd459, 0x0, 0x7, 0xff}, ["", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4085}, 0x4000000) (async) sendmsg$AUDIT_SET(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, 0x3e9, 0x4, 0x70bd29, 0x25dfdbff, {0x40, 0x1, 0x0, r5, 0x8, 0xb90, 0x23c3e635, 0xd459, 0x0, 0x7, 0xff}, ["", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4085}, 0x4000000) r6 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x340, 0xffffffff, 0xb8, 0xb8, 0x1b0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x3373}}}, {{@ip={@multicast1, @private=0xa010101, 0xff000000, 0xffff00, 'pimreg1\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0x1, 0x0, 0x14}, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@set={{0x40}, {{0x1, [0x0, 0x0, 0x6, 0x1, 0x4, 0x1], 0x0, 0x2}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'veth0_to_team\x00', {0x63}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xff000000, 'wg0\x00', 'pim6reg\x00', {0xff}, {0xff}, 0x8, 0x0, 0x26}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x10, "06b4"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x3ff, 0x1, [0x3, 0x32, 0x6, 0x6, 0x32, 0x1, 0x25, 0x1, 0x3c, 0x29, 0x1f, 0x1e, 0x30, 0x11, 0x3, 0x3], 0x2, 0xbdb0, 0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="a8e7e985549c17601c0ed5caa770bcd2a8662543f43803cac4bf1579168f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x83}, @alu={0x7, 0x0, 0x3, 0x6, 0x3, 0xfffffffffffffffe, 0x5969d75a3d7a30e7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001e40)='GPL\x00', 0xfffffffe}, 0x90) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000003c0)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) (async) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000003c0)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x3, 0xffffffffffffffff, 0x28, 0x1, @in6={0xa, 0x4e22, 0x322, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x1f}}}, 0xa0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095007ab2e843c64c"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r10}, 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r11, 0x0, 0x28, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @empty}, 0xc) (async) setsockopt$inet_mreqsrc(r11, 0x0, 0x28, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @empty}, 0xc) 12:14:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) 12:14:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="86"], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) (async) 12:14:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) [ 2252.880677][T14139] IPVS: set_ctl: invalid protocol: 137 172.20.20.170:20002 12:14:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, &(0x7f0000000700), &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) 12:14:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @private=0xa010101, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r5, 0x0) (async, rerun: 32) syz_open_procfs(r5, 0x0) (async, rerun: 32) sendmsg$AUDIT_SET(r4, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, 0x3e9, 0x4, 0x70bd29, 0x25dfdbff, {0x40, 0x1, 0x0, r5, 0x8, 0xb90, 0x23c3e635, 0xd459, 0x0, 0x7, 0xff}, ["", "", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4085}, 0x4000000) (async) r6 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000580)=@security={'security\x00', 0xe, 0x4, 0x340, 0xffffffff, 0xb8, 0xb8, 0x1b0, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x3373}}}, {{@ip={@multicast1, @private=0xa010101, 0xff000000, 0xffff00, 'pimreg1\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0x1, 0x0, 0x14}, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@set={{0x40}, {{0x1, [0x0, 0x0, 0x6, 0x1, 0x4, 0x1], 0x0, 0x2}}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'veth0_to_team\x00', {0x63}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xff000000, 'wg0\x00', 'pim6reg\x00', {0xff}, {0xff}, 0x8, 0x0, 0x26}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28}, {0x10, "06b4"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x3ff, 0x1, [0x3, 0x32, 0x6, 0x6, 0x32, 0x1, 0x25, 0x1, 0x3c, 0x29, 0x1f, 0x1e, 0x30, 0x11, 0x3, 0x3], 0x2, 0xbdb0, 0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB="a8e7e985549c17601c0ed5caa770bcd2a8662543f43803cac4bf1579168f", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x83}, @alu={0x7, 0x0, 0x3, 0x6, 0x3, 0xfffffffffffffffe, 0x5969d75a3d7a30e7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001e40)='GPL\x00', 0xfffffffe}, 0x90) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000003c0)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x3, 0xffffffffffffffff, 0x28, 0x1, @in6={0xa, 0x4e22, 0x322, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x1f}}}, 0xa0) (async, rerun: 32) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095007ab2e843c64c"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r10}, 0x90) r11 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r11, 0x0, 0x28, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @empty}, 0xc) 12:14:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000001e40)='GPL\x00'}, 0x90) 12:14:33 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) [ 2253.231033][T14094] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2253.242451][T14094] CPU: 1 PID: 14094 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2253.252555][T14094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2253.262630][T14094] Call Trace: [ 2253.265917][T14094] [ 2253.268884][T14094] dump_stack_lvl+0xda/0x130 [ 2253.273529][T14094] dump_stack+0x15/0x20 [ 2253.277703][T14094] dump_header+0x82/0x2d0 [ 2253.282173][T14094] oom_kill_process+0x33a/0x4c0 [ 2253.287065][T14094] out_of_memory+0x9ca/0xbf0 [ 2253.291706][T14094] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2253.297857][T14094] mem_cgroup_out_of_memory+0x139/0x190 [ 2253.303456][T14094] try_charge_memcg+0x759/0xd20 [ 2253.308357][T14094] ? __swap_duplicate+0x29b/0x2b0 [ 2253.313524][T14094] ? radix_tree_lookup+0xf9/0x150 [ 2253.318615][T14094] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2253.324764][T14094] __read_swap_cache_async+0x2b9/0x510 [ 2253.330258][T14094] swap_cluster_readahead+0x276/0x3f0 [ 2253.335661][T14094] swapin_readahead+0xe2/0x7a0 [ 2253.340426][T14094] ? __filemap_get_folio+0x41a/0x5a0 [ 2253.345746][T14094] ? swap_cache_get_folio+0x6e/0x200 [ 2253.351094][T14094] do_swap_page+0x44c/0x1570 [ 2253.355692][T14094] ? __rcu_read_lock+0x35/0x50 [ 2253.360461][T14094] ? pte_offset_map_nolock+0x124/0x1d0 [ 2253.365988][T14094] handle_mm_fault+0x7f6/0x27b0 [ 2253.370877][T14094] ? mas_walk+0x204/0x320 [ 2253.375272][T14094] exc_page_fault+0x3ff/0x6d0 [ 2253.380012][T14094] asm_exc_page_fault+0x26/0x30 [ 2253.384916][T14094] RIP: 0033:0x7f6a5bd7cda4 [ 2253.389418][T14094] Code: 01 00 00 69 3d 11 e9 c9 00 e8 03 00 00 48 8d 1d f2 51 17 00 e8 9d 5f 04 00 eb 0f 0f 1f 00 48 81 c3 d0 00 00 00 48 39 eb 74 be <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df e8 f7 ee ff ff eb [ 2253.409024][T14094] RSP: 002b:00007ffd009d4f10 EFLAGS: 00010202 [ 2253.415181][T14094] RAX: 0000000000000000 RBX: 00007f6a5bef1f80 RCX: 0000000000000000 [ 2253.423149][T14094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555556c34788 [ 2253.431120][T14094] RBP: 00007f6a5bef3980 R08: 0000000000000000 R09: 00007ffd009d70b0 [ 2253.439092][T14094] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002262c5 [ 2253.447061][T14094] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 0000000000225f84 [ 2253.455032][T14094] [ 2253.458173][T14094] memory: usage 307188kB, limit 307200kB, failcnt 19572 [ 2253.465258][T14094] memory+swap: usage 307480kB, limit 9007199254740988kB, failcnt 0 [ 2253.473336][T14094] kmem: usage 307156kB, limit 9007199254740988kB, failcnt 0 [ 2253.480827][T14094] Memory cgroup stats for /syz1: [ 2253.481027][T14094] cache 4096 [ 2253.489318][T14094] rss 8192 [ 2253.492468][T14094] shmem 0 [ 2253.495582][T14094] mapped_file 0 [ 2253.499272][T14094] dirty 0 [ 2253.502219][T14094] writeback 4096 [ 2253.505865][T14094] workingset_refault_anon 541 [ 2253.510632][T14094] workingset_refault_file 1 [ 2253.515383][T14094] swap 299008 [ 2253.518811][T14094] swapcached 20480 [ 2253.522659][T14094] pgpgin 1657393 [ 2253.526406][T14094] pgpgout 1657387 [ 2253.530197][T14094] pgfault 1275282 [ 2253.533902][T14094] pgmajfault 185 [ 2253.537550][T14094] inactive_anon 8192 [ 2253.541451][T14094] active_anon 0 [ 2253.544965][T14094] inactive_file 0 [ 2253.548877][T14094] active_file 4096 [ 2253.552782][T14094] unevictable 0 [ 2253.556335][T14094] hierarchical_memory_limit 314572800 [ 2253.561851][T14094] hierarchical_memsw_limit 9223372036854771712 [ 2253.568095][T14094] total_cache 4096 [ 2253.571964][T14094] total_rss 8192 [ 2253.575646][T14094] total_shmem 0 [ 2253.579114][T14094] total_mapped_file 0 [ 2253.583160][T14094] total_dirty 0 [ 2253.586640][T14094] total_writeback 4096 [ 2253.590715][T14094] total_workingset_refault_anon 541 [ 2253.596003][T14094] total_workingset_refault_file 1 [ 2253.601143][T14094] total_swap 299008 [ 2253.605002][T14094] total_swapcached 20480 [ 2253.609247][T14094] total_pgpgin 1657393 [ 2253.613320][T14094] total_pgpgout 1657387 [ 2253.617502][T14094] total_pgfault 1275282 [ 2253.621657][T14094] total_pgmajfault 185 [ 2253.625747][T14094] total_inactive_anon 8192 [ 2253.630169][T14094] total_active_anon 0 [ 2253.634165][T14094] total_inactive_file 0 [ 2253.638398][T14094] total_active_file 4096 [ 2253.642641][T14094] total_unevictable 0 [ 2253.646684][T14094] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14094,uid=0 [ 2253.662087][T14094] Memory cgroup out of memory: Killed process 14094 (syz-executor.1) total-vm:46440kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="86"], 0x0}, 0x90) 12:14:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x2, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], 0x0, 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) (async) r1 = getpgrp(r0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(r2, 0x0) (async) r4 = syz_open_procfs(r2, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000040), 0x4003) (async) gettid() r5 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000000c0)={0x89, @local, 0x4e22, 0x4, 'sh\x00', 0x20, 0x4, 0x6b}, 0x2c) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000080), 0x4003) gettid() (async) r6 = shmget(0x3, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x0}}, './file0\x00'}) (async) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r4, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x3, r7, r8, 0xee01, r9, 0x104, 0x5}, 0x5, 0x800, 0x9, 0x0, r2, r2, 0x21}) 12:14:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xfffffbff, 0x800, 0x41c00000, 0x0, 0x1, 0x4b9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0xb}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xd, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0x1, 0xffffffffffffffff}, 0x4) r17 = syz_open_procfs(0x0, &(0x7f0000000440)='comm\x00') r18 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x19, &(0x7f0000000000)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x1f, 0x8, 0x2, 0x81, 0x2}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @call={0x85, 0x0, 0x0, 0x5f}, @alu={0x7, 0x1, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x1}], &(0x7f0000000100)='GPL\x00', 0x5, 0x9b, &(0x7f0000000180)=""/155, 0x41100, 0x11, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r9, r10, r11, r12, 0x1, r15, r16, r17, r18], &(0x7f0000000540)=[{0x3, 0x3, 0x8, 0x4}, {0x0, 0x1, 0x6}], 0x10, 0x400}, 0x90) 12:14:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="86"], 0x0}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x2, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 12:14:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xfffffbff, 0x800, 0x41c00000, 0x0, 0x1, 0x4b9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0xb}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xd, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0x1, 0xffffffffffffffff}, 0x4) (async) r17 = syz_open_procfs(0x0, &(0x7f0000000440)='comm\x00') r18 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x19, &(0x7f0000000000)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x1f, 0x8, 0x2, 0x81, 0x2}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @call={0x85, 0x0, 0x0, 0x5f}, @alu={0x7, 0x1, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x1}], &(0x7f0000000100)='GPL\x00', 0x5, 0x9b, &(0x7f0000000180)=""/155, 0x41100, 0x11, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r9, r10, r11, r12, 0x1, r15, r16, r17, r18], &(0x7f0000000540)=[{0x3, 0x3, 0x8, 0x4}, {0x0, 0x1, 0x6}], 0x10, 0x400}, 0x90) 12:14:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x2, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) socket$nl_audit(0x10, 0x3, 0x9) (async) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18}, 0x18}}, 0x0) (async) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x2, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) (async) 12:14:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="86"], 0x0}, 0x90) 12:14:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 4: r0 = shmget(0x1, 0xd000, 0x800, &(0x7f0000ff0000/0xd000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/4096) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x80}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000eb666013eba11a50fa2429c55c00926ea791bb"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x10, 0xfffbfffd}, 0x90) 12:14:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xfffffbff, 0x800, 0x41c00000, 0x0, 0x1, 0x4b9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0xb}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xd, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) (async) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xd, 0x0, 0x1, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) (async) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0x1, 0xffffffffffffffff}, 0x4) syz_open_procfs(0x0, &(0x7f0000000440)='comm\x00') (async) r17 = syz_open_procfs(0x0, &(0x7f0000000440)='comm\x00') r18 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x19, &(0x7f0000000000)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x1f, 0x8, 0x2, 0x81, 0x2}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @call={0x85, 0x0, 0x0, 0x5f}, @alu={0x7, 0x1, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x1}], &(0x7f0000000100)='GPL\x00', 0x5, 0x9b, &(0x7f0000000180)=""/155, 0x41100, 0x11, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000240)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r9, r10, r11, r12, 0x1, r15, r16, r17, r18], &(0x7f0000000540)=[{0x3, 0x3, 0x8, 0x4}, {0x0, 0x1, 0x6}], 0x10, 0x400}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 4: r0 = shmget(0x1, 0xd000, 0x800, &(0x7f0000ff0000/0xd000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/4096) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x80}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000eb666013eba11a50fa2429c55c00926ea791bb"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x10, 0xfffbfffd}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 5: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r5, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r10, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r10}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r10}}, 0xc) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18684f646638034894000000000400000000f5ffeff129b8f2c3b095711f4457ddf6e6d149a772654e8c8bc3f68c2a3fd407ebaa1193b61e64eee9fc7f659341c4a366e118ad0395373a204a439eea0811ae379ddb706efeffcdf2d69a92fafc5e24b2d4107e6427fc526633d38c4d74b88af2ac0651d3f2cf6bd2f58bdd339990d3a32a458c6ab0f8bba28e756d6f45c238988cb09e2aea0646c91c55d639c6f11630a2f7d9616f70b769f448700bdcb825cea9893a479a15dfde269893ae1266f5a7b286928cdf549372d1d419", @ANYRES32=r11, @ANYBLOB="0000000000000000850000001f0000002f360100f0ffffff0450040000000000180000000500000000000000020000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r11}, 0x4) sendmsg$nl_route(r13, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="20000000140010002cbd7000fbdbdf250210a0fd", @ANYRES32=r14, @ANYBLOB="08000200ac1414aaa8a092bca57a030f951326ac94cb91b696692ff49e1f278d325d8f6ca801782e2fea168da8b8bf55eef813429ec1ccea589f170f67414c53a2a7ed272704fee710b3b0fbb77e4c85aeeb5868a8b07f5f15075f90cb25c2d6fadfe09f16e7ffe6d4a5bf4fb162d3c6d9ed19a17376fb"], 0x20}, 0x1, 0x0, 0x0, 0x40054}, 0x2302e78834359aaf) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 12:14:34 executing program 4: r0 = shmget(0x1, 0xd000, 0x800, &(0x7f0000ff0000/0xd000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000180)=""/4096) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x80}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000eb666013eba11a50fa2429c55c00926ea791bb"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x10, 0xfffbfffd}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 5: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) (async) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) (async) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r5, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r10, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r10}}, 0xc) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r10}}, 0xc) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18684f646638034894000000000400000000f5ffeff129b8f2c3b095711f4457ddf6e6d149a772654e8c8bc3f68c2a3fd407ebaa1193b61e64eee9fc7f659341c4a366e118ad0395373a204a439eea0811ae379ddb706efeffcdf2d69a92fafc5e24b2d4107e6427fc526633d38c4d74b88af2ac0651d3f2cf6bd2f58bdd339990d3a32a458c6ab0f8bba28e756d6f45c238988cb09e2aea0646c91c55d639c6f11630a2f7d9616f70b769f448700bdcb825cea9893a479a15dfde269893ae1266f5a7b286928cdf549372d1d419", @ANYRES32=r11, @ANYBLOB="0000000000000000850000001f0000002f360100f0ffffff0450040000000000180000000500000000000000020000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) r13 = socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r11}, 0x4) (async) sendmsg$nl_route(r13, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="20000000140010002cbd7000fbdbdf250210a0fd", @ANYRES32=r14, @ANYBLOB="08000200ac1414aaa8a092bca57a030f951326ac94cb91b696692ff49e1f278d325d8f6ca801782e2fea168da8b8bf55eef813429ec1ccea589f170f67414c53a2a7ed272704fee710b3b0fbb77e4c85aeeb5868a8b07f5f15075f90cb25c2d6fadfe09f16e7ffe6d4a5bf4fb162d3c6d9ed19a17376fb"], 0x20}, 0x1, 0x0, 0x0, 0x40054}, 0x2302e78834359aaf) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000900)=[{0x2, 0x3, 0x6, 0x2}, {0x0, 0x3, 0x3, 0x8}, {0x2, 0x1, 0x4}, {0x2, 0x4, 0xc, 0xb}, {0x4, 0x1, 0xb, 0xc}], 0x10, 0x9}, 0x90) 12:14:34 executing program 5: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f6, 0x201, 0x7, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x80) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x3fd, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b000000b67188901c9dd5b1eb83efbcf511be383ea4072e73f43cfec4d97be1df69a02a2cd8ea52676593983398cc4f40068267b1be84bb864671764c769b4ab5e29bfbdb6e5c628e7bf2248b5fd1"]}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f0000000700)={0x62, @rand_addr=0x64010101, 0x4e23, 0x1, 'fo\x00', 0x25, 0x1000000, 0x7}, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x5, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x401, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000000480)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c653000902fb3ca9c865b4c7afaaabd7020"]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB='./file4/file0\x00']) write$selinux_attr(r5, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) (async) write$selinux_attr(r5, &(0x7f0000000280)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x2, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000640)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x0, r10, 0x10, 0x1, @in6={0xa, 0x4e21, 0xfffffffa, @mcast1}}}, 0xa0) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r10}}, 0xc) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r10}}, 0xc) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18684f646638034894000000000400000000f5ffeff129b8f2c3b095711f4457ddf6e6d149a772654e8c8bc3f68c2a3fd407ebaa1193b61e64eee9fc7f659341c4a366e118ad0395373a204a439eea0811ae379ddb706efeffcdf2d69a92fafc5e24b2d4107e6427fc526633d38c4d74b88af2ac0651d3f2cf6bd2f58bdd339990d3a32a458c6ab0f8bba28e756d6f45c238988cb09e2aea0646c91c55d639c6f11630a2f7d9616f70b769f448700bdcb825cea9893a479a15dfde269893ae1266f5a7b286928cdf549372d1d419", @ANYRES32=r11, @ANYBLOB="0000000000000000850000001f0000002f360100f0ffffff0450040000000000180000000500000000000000020000009500000000000000"], &(0x7f0000001e40)='GPL\x00'}, 0x90) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r11}, 0x4) sendmsg$nl_route(r13, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="20000000140010002cbd7000fbdbdf250210a0fd", @ANYRES32=r14, @ANYBLOB="08000200ac1414aaa8a092bca57a030f951326ac94cb91b696692ff49e1f278d325d8f6ca801782e2fea168da8b8bf55eef813429ec1ccea589f170f67414c53a2a7ed272704fee710b3b0fbb77e4c85aeeb5868a8b07f5f15075f90cb25c2d6fadfe09f16e7ffe6d4a5bf4fb162d3c6d9ed19a17376fb"], 0x20}, 0x1, 0x0, 0x0, 0x40054}, 0x2302e78834359aaf) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) 12:14:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)=r0}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%pB \x00'}, 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="0000f1110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x2f, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x6, 0x1, 0x0, r3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1b, &(0x7f0000000580)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x60}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0xb, 0x1, 0x0, r8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @generic={0x5, 0x6, 0x4, 0x5, 0x5}], &(0x7f00000000c0)='GPL\x00', 0x200, 0x0, 0x0, 0x40e00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x3, 0x0, 0x2, 0x1ff}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[{0x4, 0x2, 0xe, 0x8}, {0x4, 0x1, 0xf, 0xa}, {0x1, 0x2, 0xc, 0x4}], 0x10, 0x400}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) 12:14:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)=r0}, 0x20) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%pB \x00'}, 0x20) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="0000f1110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x2f, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x6, 0x1, 0x0, r3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1b, &(0x7f0000000580)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x60}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0xb, 0x1, 0x0, r8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @generic={0x5, 0x6, 0x4, 0x5, 0x5}], &(0x7f00000000c0)='GPL\x00', 0x200, 0x0, 0x0, 0x40e00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x3, 0x0, 0x2, 0x1ff}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[{0x4, 0x2, 0xe, 0x8}, {0x4, 0x1, 0xf, 0xa}, {0x1, 0x2, 0xc, 0x4}], 0x10, 0x400}, 0x90) 12:14:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x1, 0x80, 0x1000, 0x200, {{0xb, 0x4, 0x1, 0x3f, 0x2c, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @multicast2, {[@generic={0x82, 0xa, "457cb68e2ec79c74"}, @cipso={0x86, 0xd, 0x1, [{0x7, 0x7, "7dbea9f354"}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x16, 0x2, 0x8, 0x3, 0x2008, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r15, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) r18 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r18, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000e0009078000000006401010207136aac1414bbffffddff0a0101016401010001831f37e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3f3e056b91518c8b000000"]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r20}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r19, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r17], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x25, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ldst={0x1, 0x3, 0x2, 0x8, 0xb, 0xfffffffffffffff4, 0x10}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x29}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @jmp={0x5, 0x1, 0x5, 0x1, 0xb, 0x50, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x80}, @generic={0x7f, 0x1, 0x2, 0xff54, 0x8}, @call={0x85, 0x0, 0x0, 0xa7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, &(0x7f00000000c0), 0x41000, 0x9, '\x00', r9, 0x0, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x5a29, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000600)=[r11, r12, 0xffffffffffffffff, r15, r16, r17, r20], &(0x7f0000000640)=[{0x5, 0x2, 0x1, 0x3}, {0x4, 0x5, 0xc}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2, &(0x7f0000000700)=@raw=[@map_idx], &(0x7f0000000740)='syzkaller\x00', 0x3, 0x3, &(0x7f0000000780)=""/3, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0xfffffffffffffffc}, 0x90) 12:14:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000100)=r0}, 0x20) (async, rerun: 64) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%pB \x00'}, 0x20) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="0000f1110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x2f, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0x6, 0x1, 0x0, r3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x1b, &(0x7f0000000580)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x60}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0xb, 0x1, 0x0, r8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @generic={0x5, 0x6, 0x4, 0x5, 0x5}], &(0x7f00000000c0)='GPL\x00', 0x200, 0x0, 0x0, 0x40e00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x3, 0x0, 0x2, 0x1ff}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[{0x4, 0x2, 0xe, 0x8}, {0x4, 0x1, 0xf, 0xa}, {0x1, 0x2, 0xc, 0x4}], 0x10, 0x400}, 0x90) 12:14:34 executing program 2: syz_clone(0x180000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = getpgrp(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r3 = accept4$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r6 = accept4$bt_l2cap(r3, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r6, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r5, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r9], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r4, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r4, {0xee01, 0xee00}}, './file0/file0\x00'}) ioctl$BINDER_GET_FROZEN_INFO(r7, 0xc00c620f, &(0x7f0000000000)={r0}) 12:14:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) (async) getsockname(r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x1, 0x80, 0x1000, 0x200, {{0xb, 0x4, 0x1, 0x3f, 0x2c, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @multicast2, {[@generic={0x82, 0xa, "457cb68e2ec79c74"}, @cipso={0x86, 0xd, 0x1, [{0x7, 0x7, "7dbea9f354"}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x1, 0x80, 0x1000, 0x200, {{0xb, 0x4, 0x1, 0x3f, 0x2c, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @multicast2, {[@generic={0x82, 0xa, "457cb68e2ec79c74"}, @cipso={0x86, 0xd, 0x1, [{0x7, 0x7, "7dbea9f354"}]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x16, 0x2, 0x8, 0x3, 0x2008, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r15, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r15, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) (async) r18 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r18, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000e0009078000000006401010207136aac1414bbffffddff0a0101016401010001831f37e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3f3e056b91518c8b000000"]}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r18, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000e0009078000000006401010207136aac1414bbffffddff0a0101016401010001831f37e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3f3e056b91518c8b000000"]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r20}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r19, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r17], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x25, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ldst={0x1, 0x3, 0x2, 0x8, 0xb, 0xfffffffffffffff4, 0x10}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x29}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @jmp={0x5, 0x1, 0x5, 0x1, 0xb, 0x50, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x80}, @generic={0x7f, 0x1, 0x2, 0xff54, 0x8}, @call={0x85, 0x0, 0x0, 0xa7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, &(0x7f00000000c0), 0x41000, 0x9, '\x00', r9, 0x0, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x5a29, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000600)=[r11, r12, 0xffffffffffffffff, r15, r16, r17, r20], &(0x7f0000000640)=[{0x5, 0x2, 0x1, 0x3}, {0x4, 0x5, 0xc}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) [ 2254.394570][T14190] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2254.405966][T14190] CPU: 1 PID: 14190 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2254.416124][T14190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2254.426275][T14190] Call Trace: [ 2254.429709][T14190] [ 2254.432692][T14190] dump_stack_lvl+0xda/0x130 [ 2254.437327][T14190] dump_stack+0x15/0x20 [ 2254.441512][T14190] dump_header+0x82/0x2d0 [ 2254.445941][T14190] oom_kill_process+0x33a/0x4c0 [ 2254.450823][T14190] out_of_memory+0x9ca/0xbf0 [ 2254.455479][T14190] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2254.461742][T14190] mem_cgroup_out_of_memory+0x139/0x190 [ 2254.467335][T14190] try_charge_memcg+0x759/0xd20 [ 2254.472227][T14190] ? __swap_duplicate+0x29b/0x2b0 [ 2254.477361][T14190] ? radix_tree_lookup+0xf9/0x150 [ 2254.482490][T14190] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2254.488669][T14190] __read_swap_cache_async+0x2b9/0x510 [ 2254.494418][T14190] swap_cluster_readahead+0x276/0x3f0 [ 2254.499860][T14190] swapin_readahead+0xe2/0x7a0 [ 2254.504637][T14190] ? __filemap_get_folio+0x41a/0x5a0 [ 2254.510074][T14190] ? swap_cache_get_folio+0x6e/0x200 [ 2254.515405][T14190] do_swap_page+0x44c/0x1570 [ 2254.520031][T14190] ? _raw_spin_unlock+0x26/0x40 [ 2254.524902][T14190] ? __rcu_read_lock+0x35/0x50 [ 2254.529756][T14190] ? pte_offset_map_nolock+0x124/0x1d0 [ 2254.535246][T14190] handle_mm_fault+0x7f6/0x27b0 [ 2254.540143][T14190] exc_page_fault+0x2f7/0x6d0 [ 2254.544879][T14190] asm_exc_page_fault+0x26/0x30 [ 2254.549846][T14190] RIP: 0010:__get_user_8+0x11/0x20 [ 2254.555022][T14190] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 8b 10 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <48> 8b 10 31 c0 0f 01 ca c3 66 0f 1f 44 00 00 f3 0f 1e fa 0f 01 cb [ 2254.574796][T14190] RSP: 0018:ffffc9000138fe38 EFLAGS: 00050202 [ 2254.580891][T14190] RAX: 0000555556c34da8 RBX: ffffc9000138fe40 RCX: ffffffff8144b3b3 [ 2254.588883][T14190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888130473a90 [ 2254.596937][T14190] RBP: ffffc9000138ff00 R08: 0001888130473a97 R09: 0000000000000000 [ 2254.604987][T14190] R10: 0001ffffffffffff R11: 00000000000035df R12: ffff8881304730c0 [ 2254.613027][T14190] R13: ffff888130473a90 R14: ffffc9000138ff58 R15: ffffc9000138ffd8 [ 2254.621074][T14190] ? __rseq_handle_notify_resume+0xb3/0xbf0 [ 2254.627008][T14190] __rseq_handle_notify_resume+0xc7/0xbf0 [ 2254.632754][T14190] ? blkcg_maybe_throttle_current+0xa0/0x710 [ 2254.638800][T14190] ? __se_sys_clock_nanosleep+0x202/0x230 [ 2254.644561][T14190] ? mem_cgroup_handle_over_high+0x2c/0x1b0 [ 2254.650546][T14190] syscall_exit_to_user_mode+0x8e/0x130 [ 2254.656241][T14190] do_syscall_64+0x65/0x120 [ 2254.660772][T14190] ? irqentry_exit+0x12/0x40 [ 2254.665389][T14190] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2254.671406][T14190] RIP: 0033:0x7f6a5bdee1b5 [ 2254.675849][T14190] Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 f6 b9 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 4f ba ff ff 48 8b 04 24 48 83 c4 28 f7 d8 [ 2254.695487][T14190] RSP: 002b:00007ffd009d4ea0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 2254.703931][T14190] RAX: 0000000000000000 RBX: 00007f6a5bef1f80 RCX: 00007f6a5bdee1b5 [ 2254.711925][T14190] RDX: 00007ffd009d4ee0 RSI: 0000000000000000 RDI: 0000000000000000 [ 2254.719986][T14190] RBP: 00007f6a5bef3980 R08: 0000000000000000 R09: 00007ffd009d70b0 [ 2254.727983][T14190] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000022674f [ 2254.735991][T14190] R13: ffffffffffffffff R14: 00007f6a5b946000 R15: 000000000022640e [ 2254.743987][T14190] [ 2254.747176][T14190] memory: usage 307200kB, limit 307200kB, failcnt 19730 [ 2254.754204][T14190] memory+swap: usage 307496kB, limit 9007199254740988kB, failcnt 0 [ 2254.762163][T14190] kmem: usage 307180kB, limit 9007199254740988kB, failcnt 0 [ 2254.769493][T14190] Memory cgroup stats for /syz1: [ 2254.769668][T14190] cache 4096 [ 2254.777956][T14190] rss 8192 [ 2254.780992][T14190] shmem 0 [ 2254.783939][T14190] mapped_file 0 [ 2254.787439][T14190] dirty 0 [ 2254.790460][T14190] writeback 0 [ 2254.793928][T14190] workingset_refault_anon 570 [ 2254.798650][T14190] workingset_refault_file 1 [ 2254.803202][T14190] swap 303104 [ 2254.806521][T14190] swapcached 8192 [ 2254.810164][T14190] pgpgin 1657449 [ 2254.813788][T14190] pgpgout 1657446 [ 2254.817463][T14190] pgfault 1275410 [ 2254.821122][T14190] pgmajfault 198 [ 2254.824709][T14190] inactive_anon 0 [ 2254.828349][T14190] active_anon 4096 [ 2254.832113][T14190] inactive_file 0 [ 2254.835781][T14190] active_file 4096 [ 2254.839519][T14190] unevictable 0 [ 2254.842991][T14190] hierarchical_memory_limit 314572800 [ 2254.848478][T14190] hierarchical_memsw_limit 9223372036854771712 [ 2254.854711][T14190] total_cache 4096 [ 2254.858461][T14190] total_rss 8192 [ 2254.862016][T14190] total_shmem 0 [ 2254.865684][T14190] total_mapped_file 0 [ 2254.869901][T14190] total_dirty 0 [ 2254.873413][T14190] total_writeback 0 [ 2254.877376][T14190] total_workingset_refault_anon 570 [ 2254.882643][T14190] total_workingset_refault_file 1 [ 2254.887831][T14190] total_swap 303104 [ 2254.891862][T14190] total_swapcached 8192 [ 2254.896365][T14190] total_pgpgin 1657449 [ 2254.900532][T14190] total_pgpgout 1657446 [ 2254.904817][T14190] total_pgfault 1275410 [ 2254.909130][T14190] total_pgmajfault 198 [ 2254.913311][T14190] total_inactive_anon 0 [ 2254.917602][T14190] total_active_anon 4096 [ 2254.922078][T14190] total_inactive_file 0 [ 2254.926490][T14190] total_active_file 4096 [ 2254.930931][T14190] total_unevictable 0 [ 2254.934998][T14190] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14190,uid=0 [ 2254.951531][T14190] Memory cgroup out of memory: Killed process 14190 (syz-executor.1) total-vm:46440kB, anon-rss:508kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:35 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x8000, 0x4, 0x400, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0x80, 0x29, 0x0, @private=0xa010102, @broadcast, {[@rr={0x7, 0xf, 0xae, [@local, @dev={0xac, 0x14, 0x14, 0xb}, @local]}, @timestamp_addr={0x44, 0x44, 0xa7, 0x1, 0xb, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@local, 0x2cb505f9}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0xfff}, {@loopback, 0x9c}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x8}, {@loopback, 0x3ff}]}]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x0, 0x4, 0x7, 0x5, 0x10, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @alu={0x7, 0x0, 0xa, 0x7, 0x2, 0x0, 0xffffffffffffffff}], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', r0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r5 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_buf(r5, 0x0, 0x2b, &(0x7f0000000200), &(0x7f0000000240)) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="5c4bb8050f38257212856fa96d70403fabd8f99e7bd6c63fbe037c03dd6db3ffd57ca2bc4da229201b79919c"], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='numa_maps\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x7f, '\x00', r7, r8, 0x2, 0x3, 0x4}, 0x48) 12:14:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r4 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x1, 0x80, 0x1000, 0x200, {{0xb, 0x4, 0x1, 0x3f, 0x2c, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @multicast2, {[@generic={0x82, 0xa, "457cb68e2ec79c74"}, @cipso={0x86, 0xd, 0x1, [{0x7, 0x7, "7dbea9f354"}]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x16, 0x2, 0x8, 0x3, 0x2008, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) (async) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r13, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r15, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) (async) r18 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r18, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000e0009078000000006401010207136aac1414bbffffddff0a0101016401010001831f37e000000100000000ffffffff64010100ffffffff0a0101007f000001880e9616b0fa3f3e056b91518c8b000000"]}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r20}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r19, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r17], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x25, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ldst={0x1, 0x3, 0x2, 0x8, 0xb, 0xfffffffffffffff4, 0x10}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x29}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @jmp={0x5, 0x1, 0x5, 0x1, 0xb, 0x50, 0x8}, @alu={0x4, 0x1, 0x8, 0x1, 0xb, 0x80}, @generic={0x7f, 0x1, 0x2, 0xff54, 0x8}, @call={0x85, 0x0, 0x0, 0xa7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, &(0x7f00000000c0), 0x41000, 0x9, '\x00', r9, 0x0, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x5a29, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000600)=[r11, r12, 0xffffffffffffffff, r15, r16, r17, r20], &(0x7f0000000640)=[{0x5, 0x2, 0x1, 0x3}, {0x4, 0x5, 0xc}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:35 executing program 0: r0 = syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) r1 = getpgrp(r0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(r2, 0x0) r4 = syz_open_procfs(r2, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000040), 0x4003) gettid() r5 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000000c0)={0x89, @local, 0x4e22, 0x4, 'sh\x00', 0x20, 0x4, 0x6b}, 0x2c) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000080), 0x4003) gettid() r6 = shmget(0x3, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x0}}, './file0\x00'}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r4, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x3, r7, r8, 0xee01, r9, 0x104, 0x5}, 0x5, 0x800, 0x9, 0x0, r2, r2, 0x21}) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r0, &(0x7f0000000000), 0x4003) (async) getpgrp(r0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs(r2, 0x0) (async) syz_open_procfs(r2, 0x0) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000040), 0x4003) (async) gettid() (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000000c0)={0x89, @local, 0x4e22, 0x4, 'sh\x00', 0x20, 0x4, 0x6b}, 0x2c) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r1, &(0x7f0000000080), 0x4003) (async) gettid() (async) shmget(0x3, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (async) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r4, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) (async) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x3, r7, r8, 0xee01, r9, 0x104, 0x5}, 0x5, 0x800, 0x9, 0x0, r2, r2, 0x21}) (async) 12:14:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001400), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 12:14:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:35 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x8000, 0x4, 0x400, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0x80, 0x29, 0x0, @private=0xa010102, @broadcast, {[@rr={0x7, 0xf, 0xae, [@local, @dev={0xac, 0x14, 0x14, 0xb}, @local]}, @timestamp_addr={0x44, 0x44, 0xa7, 0x1, 0xb, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@local, 0x2cb505f9}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0xfff}, {@loopback, 0x9c}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x8}, {@loopback, 0x3ff}]}]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x0, 0x4, 0x7, 0x5, 0x10, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @alu={0x7, 0x0, 0xa, 0x7, 0x2, 0x0, 0xffffffffffffffff}], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', r0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r5 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_buf(r5, 0x0, 0x2b, &(0x7f0000000200), &(0x7f0000000240)) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="5c4bb8050f38257212856fa96d70403fabd8f99e7bd6c63fbe037c03dd6db3ffd57ca2bc4da229201b79919c"], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='numa_maps\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x7f, '\x00', r7, r8, 0x2, 0x3, 0x4}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x8000, 0x4, 0x400, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0x80, 0x29, 0x0, @private=0xa010102, @broadcast, {[@rr={0x7, 0xf, 0xae, [@local, @dev={0xac, 0x14, 0x14, 0xb}, @local]}, @timestamp_addr={0x44, 0x44, 0xa7, 0x1, 0xb, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@local, 0x2cb505f9}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0xfff}, {@loopback, 0x9c}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x8}, {@loopback, 0x3ff}]}]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x0, 0x4, 0x7, 0x5, 0x10, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @alu={0x7, 0x0, 0xa, 0x7, 0x2, 0x0, 0xffffffffffffffff}], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', r0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) (async) socket$igmp(0x2, 0x3, 0x2) (async) getsockopt$inet_buf(r5, 0x0, 0x2b, &(0x7f0000000200), &(0x7f0000000240)) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="5c4bb8050f38257212856fa96d70403fabd8f99e7bd6c63fbe037c03dd6db3ffd57ca2bc4da229201b79919c"], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='numa_maps\x00') (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x7f, '\x00', r7, r8, 0x2, 0x3, 0x4}, 0x48) (async) 12:14:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r10, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001400), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 12:14:35 executing program 4: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x8000, 0x4, 0x400, {{0x1a, 0x4, 0x3, 0x6, 0x68, 0x64, 0x0, 0x80, 0x29, 0x0, @private=0xa010102, @broadcast, {[@rr={0x7, 0xf, 0xae, [@local, @dev={0xac, 0x14, 0x14, 0xb}, @local]}, @timestamp_addr={0x44, 0x44, 0xa7, 0x1, 0xb, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@local, 0x2cb505f9}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0xfff}, {@loopback, 0x9c}, {@dev={0xac, 0x14, 0x14, 0x3b}, 0x8}, {@loopback, 0x3ff}]}]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f00000005c0)=@raw=[@jmp={0x5, 0x0, 0x4, 0x7, 0x5, 0x10, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, @exit, @map_fd={0x18, 0xb, 0x1, 0x0, r1}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @alu={0x7, 0x0, 0xa, 0x7, 0x2, 0x0, 0xffffffffffffffff}], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', r0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r5 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_buf(r5, 0x0, 0x2b, &(0x7f0000000200), &(0x7f0000000240)) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="5c4bb8050f38257212856fa96d70403fabd8f99e7bd6c63fbe037c03dd6db3ffd57ca2bc4da229201b79919c"], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) (async, rerun: 32) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='numa_maps\x00') (rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x7f, '\x00', r7, r8, 0x2, 0x3, 0x4}, 0x48) 12:14:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000001400), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) (async) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) 12:14:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) socketpair(0x2, 0x3, 0xabe, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x0, 0x2}}, {&(0x7f0000000040)=""/76, 0x4c}, &(0x7f0000000100), 0x22}, 0xa0) 12:14:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffd2d}, 0x60) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x77d, '\x00', 0x0, r1, 0x0, 0x5, 0x1}, 0x48) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x7800, 0x10, 0xf0, 0x1bf, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010102, @multicast2, {[@timestamp_addr={0x44, 0xc, 0xf8, 0x1, 0xf, [{@loopback, 0xc0}]}]}}}}}) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/vlan/vlan1\x00') r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81d, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xfc, &(0x7f0000000280)=""/252, 0x41000, 0x4, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000400)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0xffff8001, 0x10, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000540)=[r8, r9, r12, 0xffffffffffffffff], &(0x7f0000000580)=[{0x4, 0x3, 0x4, 0xc}, {0x5, 0x1, 0x2, 0x6}, {0x1, 0x4, 0x9}, {0x2, 0x3, 0x0, 0xa}, {0x0, 0x4, 0x10, 0xb}], 0x10, 0x400}, 0x90) 12:14:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r13, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r10, {0xee00, 0xee01}}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) [ 2255.591432][T14304] IPVS: set_ctl: invalid protocol: 137 172.20.20.170:20002 12:14:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) socketpair(0x2, 0x3, 0xabe, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x0, 0x2}}, {&(0x7f0000000040)=""/76, 0x4c}, &(0x7f0000000100), 0x22}, 0xa0) 12:14:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffd2d}, 0x60) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffd2d}, 0x60) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x77d, '\x00', 0x0, r1, 0x0, 0x5, 0x1}, 0x48) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x7800, 0x10, 0xf0, 0x1bf, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010102, @multicast2, {[@timestamp_addr={0x44, 0xc, 0xf8, 0x1, 0xf, [{@loopback, 0xc0}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x7800, 0x10, 0xf0, 0x1bf, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010102, @multicast2, {[@timestamp_addr={0x44, 0xc, 0xf8, 0x1, 0xf, [{@loopback, 0xc0}]}]}}}}}) syz_open_procfs(0x0, &(0x7f00000003c0)='net/vlan/vlan1\x00') (async) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/vlan/vlan1\x00') socket$inet_udp(0x2, 0x2, 0x0) (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81d, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xfc, &(0x7f0000000280)=""/252, 0x41000, 0x4, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000400)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0xffff8001, 0x10, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000540)=[r8, r9, r12, 0xffffffffffffffff], &(0x7f0000000580)=[{0x4, 0x3, 0x4, 0xc}, {0x5, 0x1, 0x2, 0x6}, {0x1, 0x4, 0x9}, {0x2, 0x3, 0x0, 0xa}, {0x0, 0x4, 0x10, 0xb}], 0x10, 0x400}, 0x90) 12:14:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r14}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[r13, r15], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0x2, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffd2d}, 0x60) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x77d, '\x00', 0x0, r1, 0x0, 0x5, 0x1}, 0x48) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000380)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x7800, 0x10, 0xf0, 0x1bf, {{0x8, 0x4, 0x0, 0x5, 0x20, 0x67, 0x0, 0x8, 0x29, 0x0, @rand_addr=0x64010102, @multicast2, {[@timestamp_addr={0x44, 0xc, 0xf8, 0x1, 0xf, [{@loopback, 0xc0}]}]}}}}}) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/vlan/vlan1\x00') (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) (async) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r12}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81d, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xfc, &(0x7f0000000280)=""/252, 0x41000, 0x4, '\x00', r4, 0x25, r5, 0x8, &(0x7f0000000400)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0xffff8001, 0x10, 0x0, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000540)=[r8, r9, r12, 0xffffffffffffffff], &(0x7f0000000580)=[{0x4, 0x3, 0x4, 0xc}, {0x5, 0x1, 0x2, 0x6}, {0x1, 0x4, 0x9}, {0x2, 0x3, 0x0, 0xa}, {0x0, 0x4, 0x10, 0xb}], 0x10, 0x400}, 0x90) 12:14:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) socketpair(0x2, 0x3, 0xabe, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x0, 0x2}}, {&(0x7f0000000040)=""/76, 0x4c}, &(0x7f0000000100), 0x22}, 0xa0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) socketpair(0x2, 0x3, 0xabe, &(0x7f0000000000)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @remote}, 0x1, 0x4, 0x0, 0x2}}, {&(0x7f0000000040)=""/76, 0x4c}, &(0x7f0000000100), 0x22}, 0xa0) (async) 12:14:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x8000, 0x7c0, 0x2, 0x1ff, {{0x2f, 0x4, 0x1, 0x20, 0xbc, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0x79, 0x0, 0x6, [0x80000000, 0x5, 0x0, 0x0, 0x4, 0x9, 0x100, 0x7ff]}, @rr={0x7, 0xb, 0x5d, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}]}, @cipso={0x86, 0x5a, 0x2, [{0x5, 0xe, "8a10b4f34794f7bc9720e0fb"}, {0x2, 0x11, "32489954d3a73cc572148f6598e932"}, {0x6, 0x3, "e0"}, {0x2, 0xc, "aaa25e37d8182ef108bc"}, {0x1, 0x10, "e6a3bd0fae7d82ea8f1d3e638a23"}, {0x2, 0xd, "77c0f197b7e1239a332c9c"}, {0x1, 0x9, "70618018d20d4e"}]}, @generic={0x89, 0xf, "a31939f35e94398cf37d441850"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x7, 0xbe, [@private=0xa010101]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x3f, '\x00', r5, r6, 0x2, 0x5, 0x2}, 0x48) 12:14:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x8000, 0x7c0, 0x2, 0x1ff, {{0x2f, 0x4, 0x1, 0x20, 0xbc, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0x79, 0x0, 0x6, [0x80000000, 0x5, 0x0, 0x0, 0x4, 0x9, 0x100, 0x7ff]}, @rr={0x7, 0xb, 0x5d, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}]}, @cipso={0x86, 0x5a, 0x2, [{0x5, 0xe, "8a10b4f34794f7bc9720e0fb"}, {0x2, 0x11, "32489954d3a73cc572148f6598e932"}, {0x6, 0x3, "e0"}, {0x2, 0xc, "aaa25e37d8182ef108bc"}, {0x1, 0x10, "e6a3bd0fae7d82ea8f1d3e638a23"}, {0x2, 0xd, "77c0f197b7e1239a332c9c"}, {0x1, 0x9, "70618018d20d4e"}]}, @generic={0x89, 0xf, "a31939f35e94398cf37d441850"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x7, 0xbe, [@private=0xa010101]}]}}}}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x3f, '\x00', r5, r6, 0x2, 0x5, 0x2}, 0x48) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r12 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r12}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r11, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r13, 0x4, 0x2}, 0x48) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000e000095000000000000001b11abd6cc3cf10cd945703455d3f76e3ee797a91aad67e71df5cf395855a8f72218dcbd0a7c14d8e822c00a0400000000000000c3e2a8045a68ba89db3c685c750b355031d92492"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfe97, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3f, 0x3f, 0x2445, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'erspan0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000880)="244e11bafc04871240dfbc0f6cd2d8ae91136b09c836b3aff7a58e4b0d73a72cb63e0c2fc944d0b4ffc49635779b511759e9c4b9e0916a22b897c5c6326daf2887441952a339db87406e931333d7b49fd011044a833b7cc95636ded752eedd0b711369aa0bce2dfaf1c72c5f906f7f1fee66590684ef3d5665ce35ca85b06282c9b845796baa5da4eca6a292af898ab51e036efedd1faee56ac6ff34cd170265d5c2dbf748b0ff93", 0xa8, 0x20000000, &(0x7f0000000940)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x10, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x1, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x60e, 0x0, 0x0, 0x41000, 0x11, '\x00', r4, 0x32, r6, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x3, 0xc86, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000740)=[r2, r9, r2, r5, r2], &(0x7f0000000780)=[{0x2, 0x2, 0xd, 0x8}, {0x2, 0x1, 0x5, 0xa}, {0x0, 0x1, 0x2, 0xb}], 0x10, 0xe7}, 0x90) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x80, 0x18}, 0xc) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x29, 0x7f, 0x7, 0x2fc, 0xe, @local, @private1, 0x7, 0x40, 0xfffff800}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x9, 0x1, 0x0, r10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xa, &(0x7f0000000100)=""/10, 0x40f00, 0x0, '\x00', r11, 0x18, r12, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x4, 0x0, 0x9}, 0x10, 0x2b573, r1, 0x9, 0x0, &(0x7f0000000400)=[{0x3, 0x1, 0x3, 0xc}, {0x3, 0x5, 0x10, 0xe}, {0x0, 0x4, 0x7, 0x9}, {0x3, 0x8, 0x2, 0x8}, {0x2, 0x5, 0xc, 0x6}, {0x2, 0x3, 0xf, 0x5}, {0x5, 0x1, 0x0, 0xa}, {0x5, 0x3, 0xb, 0x5}, {0x0, 0x3, 0xb, 0x4}], 0x10, 0xfffffffc}, 0x90) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r11 = accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r11}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r12, 0x4, 0x2}, 0x48) 12:14:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000e000095000000000000001b11abd6cc3cf10cd945703455d3f76e3ee797a91aad67e71df5cf395855a8f72218dcbd0a7c14d8e822c00a0400000000000000c3e2a8045a68ba89db3c685c750b355031d92492"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfe97, 0x0, r0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3f, 0x3f, 0x2445, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'erspan0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000880)="244e11bafc04871240dfbc0f6cd2d8ae91136b09c836b3aff7a58e4b0d73a72cb63e0c2fc944d0b4ffc49635779b511759e9c4b9e0916a22b897c5c6326daf2887441952a339db87406e931333d7b49fd011044a833b7cc95636ded752eedd0b711369aa0bce2dfaf1c72c5f906f7f1fee66590684ef3d5665ce35ca85b06282c9b845796baa5da4eca6a292af898ab51e036efedd1faee56ac6ff34cd170265d5c2dbf748b0ff93", 0xa8, 0x20000000, &(0x7f0000000940)={0x2, 0x4e20, @empty}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x10, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x1, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x60e, 0x0, 0x0, 0x41000, 0x11, '\x00', r4, 0x32, r6, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x3, 0xc86, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000740)=[r2, r9, r2, r5, r2], &(0x7f0000000780)=[{0x2, 0x2, 0xd, 0x8}, {0x2, 0x1, 0x5, 0xa}, {0x0, 0x1, 0x2, 0xb}], 0x10, 0xe7}, 0x90) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x80, 0x18}, 0xc) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x29, 0x7f, 0x7, 0x2fc, 0xe, @local, @private1, 0x7, 0x40, 0xfffff800}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x9, 0x1, 0x0, r10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xa, &(0x7f0000000100)=""/10, 0x40f00, 0x0, '\x00', r11, 0x18, r12, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x4, 0x0, 0x9}, 0x10, 0x2b573, r1, 0x9, 0x0, &(0x7f0000000400)=[{0x3, 0x1, 0x3, 0xc}, {0x3, 0x5, 0x10, 0xe}, {0x0, 0x4, 0x7, 0x9}, {0x3, 0x8, 0x2, 0x8}, {0x2, 0x5, 0xc, 0x6}, {0x2, 0x3, 0xf, 0x5}, {0x5, 0x1, 0x0, 0xa}, {0x5, 0x3, 0xb, 0x5}, {0x0, 0x3, 0xb, 0x4}], 0x10, 0xfffffffc}, 0x90) 12:14:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x8000, 0x7c0, 0x2, 0x1ff, {{0x2f, 0x4, 0x1, 0x20, 0xbc, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x24, 0x79, 0x0, 0x6, [0x80000000, 0x5, 0x0, 0x0, 0x4, 0x9, 0x100, 0x7ff]}, @rr={0x7, 0xb, 0x5d, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}]}, @cipso={0x86, 0x5a, 0x2, [{0x5, 0xe, "8a10b4f34794f7bc9720e0fb"}, {0x2, 0x11, "32489954d3a73cc572148f6598e932"}, {0x6, 0x3, "e0"}, {0x2, 0xc, "aaa25e37d8182ef108bc"}, {0x1, 0x10, "e6a3bd0fae7d82ea8f1d3e638a23"}, {0x2, 0xd, "77c0f197b7e1239a332c9c"}, {0x1, 0x9, "70618018d20d4e"}]}, @generic={0x89, 0xf, "a31939f35e94398cf37d441850"}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x7, 0xbe, [@private=0xa010101]}]}}}}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x3f, '\x00', r5, r6, 0x2, 0x5, 0x2}, 0x48) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000e000095000000000000001b11abd6cc3cf10cd945703455d3f76e3ee797a91aad67e71df5cf395855a8f72218dcbd0a7c14d8e822c00a0400000000000000c3e2a8045a68ba89db3c685c750b355031d92492"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfe97, 0x0, r0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3f, 0x3f, 0x2445, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'erspan0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) r7 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000880)="244e11bafc04871240dfbc0f6cd2d8ae91136b09c836b3aff7a58e4b0d73a72cb63e0c2fc944d0b4ffc49635779b511759e9c4b9e0916a22b897c5c6326daf2887441952a339db87406e931333d7b49fd011044a833b7cc95636ded752eedd0b711369aa0bce2dfaf1c72c5f906f7f1fee66590684ef3d5665ce35ca85b06282c9b845796baa5da4eca6a292af898ab51e036efedd1faee56ac6ff34cd170265d5c2dbf748b0ff93", 0xa8, 0x20000000, &(0x7f0000000940)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x10, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x1, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x60e, 0x0, 0x0, 0x41000, 0x11, '\x00', r4, 0x32, r6, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x3, 0xc86, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000740)=[r2, r9, r2, r5, r2], &(0x7f0000000780)=[{0x2, 0x2, 0xd, 0x8}, {0x2, 0x1, 0x5, 0xa}, {0x0, 0x1, 0x2, 0xb}], 0x10, 0xe7}, 0x90) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x80, 0x18}, 0xc) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x29, 0x7f, 0x7, 0x2fc, 0xe, @local, @private1, 0x7, 0x40, 0xfffff800}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x9, 0x1, 0x0, r10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xa, &(0x7f0000000100)=""/10, 0x40f00, 0x0, '\x00', r11, 0x18, r12, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x4, 0x0, 0x9}, 0x10, 0x2b573, r1, 0x9, 0x0, &(0x7f0000000400)=[{0x3, 0x1, 0x3, 0xc}, {0x3, 0x5, 0x10, 0xe}, {0x0, 0x4, 0x7, 0x9}, {0x3, 0x8, 0x2, 0x8}, {0x2, 0x5, 0xc, 0x6}, {0x2, 0x3, 0xf, 0x5}, {0x5, 0x1, 0x0, 0xa}, {0x5, 0x3, 0xb, 0x5}, {0x0, 0x3, 0xb, 0x4}], 0x10, 0xfffffffc}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000e000095000000000000001b11abd6cc3cf10cd945703455d3f76e3ee797a91aad67e71df5cf395855a8f72218dcbd0a7c14d8e822c00a0400000000000000c3e2a8045a68ba89db3c685c750b355031d92492"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfe97, 0x0, r0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x3, 0x3f, 0x3f, 0x2445, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1, 0xc}, 0x48) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'erspan0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff}}, './file0\x00'}) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) sendto$inet(r2, &(0x7f0000000880)="244e11bafc04871240dfbc0f6cd2d8ae91136b09c836b3aff7a58e4b0d73a72cb63e0c2fc944d0b4ffc49635779b511759e9c4b9e0916a22b897c5c6326daf2887441952a339db87406e931333d7b49fd011044a833b7cc95636ded752eedd0b711369aa0bce2dfaf1c72c5f906f7f1fee66590684ef3d5665ce35ca85b06282c9b845796baa5da4eca6a292af898ab51e036efedd1faee56ac6ff34cd170265d5c2dbf748b0ff93", 0xa8, 0x20000000, &(0x7f0000000940)={0x2, 0x4e20, @empty}, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x10, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x7, 0x1, 0x7, 0x1, 0x0, 0xfffffffffffffffe, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x60e, 0x0, 0x0, 0x41000, 0x11, '\x00', r4, 0x32, r6, 0x8, &(0x7f00000006c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x3, 0xc86, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000740)=[r2, r9, r2, r5, r2], &(0x7f0000000780)=[{0x2, 0x2, 0xd, 0x8}, {0x2, 0x1, 0x5, 0xa}, {0x0, 0x1, 0x2, 0xb}], 0x10, 0xe7}, 0x90) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x80, 0x18}, 0xc) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x29, 0x7f, 0x7, 0x2fc, 0xe, @local, @private1, 0x7, 0x40, 0xfffff800}}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0xee00, 0xee01}}, './file0\x00'}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x9, 0x1, 0x0, r10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xa, &(0x7f0000000100)=""/10, 0x40f00, 0x0, '\x00', r11, 0x18, r12, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x4, 0x0, 0x9}, 0x10, 0x2b573, r1, 0x9, 0x0, &(0x7f0000000400)=[{0x3, 0x1, 0x3, 0xc}, {0x3, 0x5, 0x10, 0xe}, {0x0, 0x4, 0x7, 0x9}, {0x3, 0x8, 0x2, 0x8}, {0x2, 0x5, 0xc, 0x6}, {0x2, 0x3, 0xf, 0x5}, {0x5, 0x1, 0x0, 0xa}, {0x5, 0x3, 0xb, 0x5}, {0x0, 0x3, 0xb, 0x4}], 0x10, 0xfffffffc}, 0x90) (async) 12:14:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x14, &(0x7f0000000180)=@framed={{}, [@map_fd={0x18, 0x1, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x37e}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x4, 0x0, 0xa, 0x0, 0x4}, @generic={0x2, 0x6, 0x6, 0x1, 0x8}]}, &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x90) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, r11, 0x4, 0x2}, 0x48) 12:14:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x14, &(0x7f0000000180)=@framed={{}, [@map_fd={0x18, 0x1, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x37e}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x4, 0x0, 0xa, 0x0, 0x4}, @generic={0x2, 0x6, 0x6, 0x1, 0x8}]}, &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x90) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x14, &(0x7f0000000180)=@framed={{}, [@map_fd={0x18, 0x1, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x37e}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x4, 0x0, 0xa, 0x0, 0x4}, @generic={0x2, 0x6, 0x6, 0x1, 0x8}]}, &(0x7f0000001e40)='GPL\x00'}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x90) (async) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x38, 0x9, 0x10001, 0x0, 0x0, 0xffffffffffffffff, 0xcc9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3, '\x00', r5, r2, 0x1, 0x2, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000016020000000000000001000000950000000000000038435000f0ffffff3bb200000000ffff8510000003000000180000000800008000000000ffff000018690000080000000000000001000080950010bbbbd3000000040000"], &(0x7f0000000080)='syzkaller\x00', 0x1f, 0xe4, &(0x7f0000000180)=""/228, 0x41000, 0xe, '\x00', 0x0, 0x3, r2, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xfffffe01, 0x3, 0x99c4}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r3, r1, r6], &(0x7f0000000440)=[{0x1, 0x2, 0x7, 0x1}, {0x0, 0x3, 0x2, 0x9}, {0x5, 0x4, 0x3, 0x4}], 0x10, 0x50a}, 0x90) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x38, 0x9, 0x10001, 0x0, 0x0, 0xffffffffffffffff, 0xcc9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x90) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3, '\x00', r5, r2, 0x1, 0x2, 0x1}, 0x48) (async, rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pK \x00'}, 0x20) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000016020000000000000001000000950000000000000038435000f0ffffff3bb200000000ffff8510000003000000180000000800008000000000ffff000018690000080000000000000001000080950010bbbbd3000000040000"], &(0x7f0000000080)='syzkaller\x00', 0x1f, 0xe4, &(0x7f0000000180)=""/228, 0x41000, 0xe, '\x00', 0x0, 0x3, r2, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xfffffe01, 0x3, 0x99c4}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r3, r1, r6], &(0x7f0000000440)=[{0x1, 0x2, 0x7, 0x1}, {0x0, 0x3, 0x2, 0x9}, {0x5, 0x4, 0x3, 0x4}], 0x10, 0x50a}, 0x90) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r9, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x14, &(0x7f0000000180)=@framed={{}, [@map_fd={0x18, 0x1, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x37e}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x4, 0x0, 0xa, 0x0, 0x4}, @generic={0x2, 0x6, 0x6, 0x1, 0x8}]}, &(0x7f0000001e40)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5}, 0x90) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) (rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x38, 0x9, 0x10001, 0x0, 0x0, 0xffffffffffffffff, 0xcc9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x90) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3, '\x00', r5, r2, 0x1, 0x2, 0x1}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000016020000000000000001000000950000000000000038435000f0ffffff3bb200000000ffff8510000003000000180000000800008000000000ffff000018690000080000000000000001000080950010bbbbd3000000040000"], &(0x7f0000000080)='syzkaller\x00', 0x1f, 0xe4, &(0x7f0000000180)=""/228, 0x41000, 0xe, '\x00', 0x0, 0x3, r2, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0xfffffe01, 0x3, 0x99c4}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r3, r1, r6], &(0x7f0000000440)=[{0x1, 0x2, 0x7, 0x1}, {0x0, 0x3, 0x2, 0x9}, {0x5, 0x4, 0x3, 0x4}], 0x10, 0x50a}, 0x90) 12:14:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x23) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) getsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000000c0)) 12:14:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r3}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) 12:14:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x20, 0x8, 0x7f, 0x80000000, {{0x11, 0x4, 0x0, 0x1b, 0x44, 0x64, 0x0, 0x1f, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@cipso={0x86, 0x2d, 0x1, [{0x3, 0x8, "763b385c96a9"}, {0x1, 0xe, "32c20b20fdf56c4e647e09cb"}, {0x7, 0x6, "768e3c5c"}, {0x6, 0x6, "f3d6b178"}, {0x1, 0x5, "da83db"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="00a000010000000900000100480c002000645fa42b1bd035bb1301fa00008029907864010101ac1414bb070a1626be3a56e714c40000"]}) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x800, 0xfffff55c, 0x7f, 0x210, r1, 0x54d, '\x00', 0x0, r2, 0x3, 0x5, 0x2, 0x7}, 0x48) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r3, 0x0) syz_open_procfs(r3, 0x0) syz_open_procfs(r3, &(0x7f0000000080)='net/rt6_stats\x00') 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000007e2741f9cba3f3fb3755a47b0a924"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x20, 0x8, 0x7f, 0x80000000, {{0x11, 0x4, 0x0, 0x1b, 0x44, 0x64, 0x0, 0x1f, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@cipso={0x86, 0x2d, 0x1, [{0x3, 0x8, "763b385c96a9"}, {0x1, 0xe, "32c20b20fdf56c4e647e09cb"}, {0x7, 0x6, "768e3c5c"}, {0x6, 0x6, "f3d6b178"}, {0x1, 0x5, "da83db"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="00a000010000000900000100480c002000645fa42b1bd035bb1301fa00008029907864010101ac1414bb070a1626be3a56e714c40000"]}) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x800, 0xfffff55c, 0x7f, 0x210, r1, 0x54d, '\x00', 0x0, r2, 0x3, 0x5, 0x2, 0x7}, 0x48) (async) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r3, 0x0) syz_open_procfs(r3, 0x0) (async) syz_open_procfs(r3, &(0x7f0000000080)='net/rt6_stats\x00') 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000007e2741f9cba3f3fb3755a47b0a924"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x23) (async) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x23) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000000)={0x0, 0x0, 0x2}) (async) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) getsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000000c0)) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r9 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x20, 0x8, 0x7f, 0x80000000, {{0x11, 0x4, 0x0, 0x1b, 0x44, 0x64, 0x0, 0x1f, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@cipso={0x86, 0x2d, 0x1, [{0x3, 0x8, "763b385c96a9"}, {0x1, 0xe, "32c20b20fdf56c4e647e09cb"}, {0x7, 0x6, "768e3c5c"}, {0x6, 0x6, "f3d6b178"}, {0x1, 0x5, "da83db"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="00a000010000000900000100480c002000645fa42b1bd035bb1301fa00008029907864010101ac1414bb070a1626be3a56e714c40000"]}) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x800, 0xfffff55c, 0x7f, 0x210, r1, 0x54d, '\x00', 0x0, r2, 0x3, 0x5, 0x2, 0x7}, 0x48) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r3, 0x0) syz_open_procfs(r3, 0x0) syz_open_procfs(r3, &(0x7f0000000080)='net/rt6_stats\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x20, 0x8, 0x7f, 0x80000000, {{0x11, 0x4, 0x0, 0x1b, 0x44, 0x64, 0x0, 0x1f, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@cipso={0x86, 0x2d, 0x1, [{0x3, 0x8, "763b385c96a9"}, {0x1, 0xe, "32c20b20fdf56c4e647e09cb"}, {0x7, 0x6, "768e3c5c"}, {0x6, 0x6, "f3d6b178"}, {0x1, 0x5, "da83db"}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="00a000010000000900000100480c002000645fa42b1bd035bb1301fa00008029907864010101ac1414bb070a1626be3a56e714c40000"]}) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x800, 0xfffff55c, 0x7f, 0x210, r1, 0x54d, '\x00', 0x0, r2, 0x3, 0x5, 0x2, 0x7}, 0x48) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_open_procfs(r3, 0x0) (async) syz_open_procfs(r3, 0x0) (async) syz_open_procfs(r3, &(0x7f0000000080)='net/rt6_stats\x00') (async) 12:14:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x23) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r2 = accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r5 = accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) getsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') (async) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x23) (async) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f0000000000)={0x0, 0x0, 0x2}) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) accept4$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) accept4$bt_l2cap(r2, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r5}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r8], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r3, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r3, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) getsockopt$inet6_tcp_int(r6, 0x6, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000000c0)) (async) 12:14:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000007e2741f9cba3f3fb3755a47b0a924"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:36 executing program 0: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:hald_acl_exec_t:s0\x00', 0x25, 0x2) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) 12:14:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r6, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf4, r5, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:37 executing program 0: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:hald_acl_exec_t:s0\x00', 0x25, 0x2) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) 12:14:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) 12:14:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x0, 0x1, &(0x7f0000001dc0)=@raw=[@call], &(0x7f0000001e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b5cb3b7b900ddbabd4358907819cd4e9bca9fd1614bc72e40253ba6265d6cd6e730f677f9f191d"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000080)="db6f04d51c36d136370870f55a438cd53460bd4701c3c52b215f595a567ff11f67443f51d2fafa14d92730177a01b8b7530ba60a05324bb10fded8551f23f7361ebac39ac8303abf37f153c7719ea2f9712086ea539383683bb0633c624a5d24beb0c0d7bb067c42869497b85ecc49b28b70ed87e8fc2f50f461d093d7af64485d1d5d60c1c1e12f07f8560085df7261b11a6d87dbdb837b8ae8042d22ac08c2b4a9d919bb25", &(0x7f0000000140)=@buf="ecf0435691dd0f98a5cfad3353c03467c202db97a8552e78d1353604dda255068e67c8a9383815ef7effab06bcb2095df9a2820eb291ec1f9c6ac325b17aa2c4355cf402e21d3c9f282216ce42", 0x4}, 0x20) 12:14:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:37 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xa77d, 0x0, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x12, 0x4, 0x1, 0x2, 0x48, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@generic={0x7, 0x3, "86"}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x6c010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x15, 0x71, 0x3c, 0x2, 0x1409, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r9, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r10 = accept4$bt_l2cap(r9, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r10, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r13 = accept4$bt_l2cap(r10, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r11, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r13, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r12, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r16], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r11, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r11, {0xee01, 0xee00}}, './file0/file0\x00'}) mknodat$loop(r14, &(0x7f0000000580)='./file0\x00', 0x1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6081}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x7, 0x79, &(0x7f0000000240)=""/121, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x6, 0x5, 0x2a000000}, 0x10, 0xa6ef, r0, 0x4, &(0x7f0000000380)=[r4, r7, r8, 0x1], &(0x7f00000003c0)=[{0x5, 0x1, 0xc, 0xa}, {0x0, 0x5, 0x0, 0xc}, {0x4, 0x2, 0x9, 0x5}, {0x1, 0x5, 0x10, 0xa}], 0x10, 0x5}, 0x90) 12:14:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b5cb3b7b900ddbabd4358907819cd4e9bca9fd1614bc72e40253ba6265d6cd6e730f677f9f191d"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) (async) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000080)="db6f04d51c36d136370870f55a438cd53460bd4701c3c52b215f595a567ff11f67443f51d2fafa14d92730177a01b8b7530ba60a05324bb10fded8551f23f7361ebac39ac8303abf37f153c7719ea2f9712086ea539383683bb0633c624a5d24beb0c0d7bb067c42869497b85ecc49b28b70ed87e8fc2f50f461d093d7af64485d1d5d60c1c1e12f07f8560085df7261b11a6d87dbdb837b8ae8042d22ac08c2b4a9d919bb25", &(0x7f0000000140)=@buf="ecf0435691dd0f98a5cfad3353c03467c202db97a8552e78d1353604dda255068e67c8a9383815ef7effab06bcb2095df9a2820eb291ec1f9c6ac325b17aa2c4355cf402e21d3c9f282216ce42", 0x4}, 0x20) 12:14:37 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:37 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xa77d, 0x0, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x12, 0x4, 0x1, 0x2, 0x48, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@generic={0x7, 0x3, "86"}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x6c010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x12, 0x4, 0x1, 0x2, 0x48, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@generic={0x7, 0x3, "86"}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x6c010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x15, 0x71, 0x3c, 0x2, 0x1409, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r9, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) getsockopt$bt_BT_FLUSHABLE(r9, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r10 = accept4$bt_l2cap(r9, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r10, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r10, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r10, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r13 = accept4$bt_l2cap(r10, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r11, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r13, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r12, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r16], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r11, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r11, {0xee01, 0xee00}}, './file0/file0\x00'}) mknodat$loop(r14, &(0x7f0000000580)='./file0\x00', 0x1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6081}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x7, 0x79, &(0x7f0000000240)=""/121, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x6, 0x5, 0x2a000000}, 0x10, 0xa6ef, r0, 0x4, &(0x7f0000000380)=[r4, r7, r8, 0x1], &(0x7f00000003c0)=[{0x5, 0x1, 0xc, 0xa}, {0x0, 0x5, 0x0, 0xc}, {0x4, 0x2, 0x9, 0x5}, {0x1, 0x5, 0x10, 0xa}], 0x10, 0x5}, 0x90) 12:14:37 executing program 0: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:hald_acl_exec_t:s0\x00', 0x25, 0x2) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:hald_acl_exec_t:s0\x00', 0x25, 0x2) (async) syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) (async) [ 2257.337022][T14422] ================================================================== [ 2257.345168][T14422] BUG: KCSAN: data-race in drain_all_stock / try_charge_memcg [ 2257.352670][T14422] [ 2257.355085][T14422] write to 0xffff888237c2a990 of 4 bytes by task 14429 on cpu 0: [ 2257.362822][T14422] try_charge_memcg+0xb46/0xd20 [ 2257.367732][T14422] obj_cgroup_charge_pages+0xbd/0x1c0 [ 2257.373146][T14422] __memcg_kmem_charge_page+0x9c/0x170 [ 2257.378648][T14422] __alloc_pages+0x1bb/0x340 [ 2257.383265][T14422] bpf_ringbuf_alloc+0xba/0x2f0 [ 2257.388179][T14422] ringbuf_map_alloc+0x167/0x1d0 [ 2257.393156][T14422] map_create+0x713/0xa40 [ 2257.397517][T14422] __sys_bpf+0x62a/0x780 [ 2257.401789][T14422] __x64_sys_bpf+0x43/0x50 [ 2257.406245][T14422] do_syscall_64+0x59/0x120 [ 2257.410785][T14422] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2257.416721][T14422] [ 2257.419065][T14422] read to 0xffff888237c2a990 of 4 bytes by task 14422 on cpu 1: [ 2257.426740][T14422] drain_all_stock+0xd3/0x2e0 [ 2257.431467][T14422] try_charge_memcg+0x6c2/0xd20 [ 2257.436346][T14422] obj_cgroup_charge_pages+0xbd/0x1c0 [ 2257.441747][T14422] __memcg_kmem_charge_page+0x9c/0x170 [ 2257.447246][T14422] __alloc_pages+0x1bb/0x340 [ 2257.451942][T14422] bpf_ringbuf_alloc+0xba/0x2f0 [ 2257.456819][T14422] ringbuf_map_alloc+0x167/0x1d0 [ 2257.461786][T14422] map_create+0x713/0xa40 [ 2257.466167][T14422] __sys_bpf+0x62a/0x780 [ 2257.470535][T14422] __x64_sys_bpf+0x43/0x50 [ 2257.474978][T14422] do_syscall_64+0x59/0x120 [ 2257.479515][T14422] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2257.485439][T14422] [ 2257.487776][T14422] value changed: 0x00000036 -> 0x0000002c [ 2257.493518][T14422] [ 2257.495856][T14422] Reported by Kernel Concurrency Sanitizer on: [ 2257.502023][T14422] CPU: 1 PID: 14422 Comm: syz-executor.3 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2257.512119][T14422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2257.522218][T14422] ================================================================== [ 2257.541123][T14418] syz-executor.3 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2257.552536][T14418] CPU: 0 PID: 14418 Comm: syz-executor.3 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2257.562629][T14418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2257.572743][T14418] Call Trace: [ 2257.576048][T14418] [ 2257.578992][T14418] dump_stack_lvl+0xda/0x130 [ 2257.583647][T14418] dump_stack+0x15/0x20 [ 2257.587834][T14418] dump_header+0x82/0x2d0 [ 2257.592221][T14418] oom_kill_process+0x33a/0x4c0 [ 2257.597096][T14418] out_of_memory+0x9ca/0xbf0 [ 2257.601726][T14418] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2257.608008][T14418] mem_cgroup_out_of_memory+0x139/0x190 [ 2257.613584][T14418] try_charge_memcg+0x759/0xd20 [ 2257.618522][T14418] ? __swap_duplicate+0x29b/0x2b0 [ 2257.623566][T14418] ? radix_tree_lookup+0xf9/0x150 [ 2257.628623][T14418] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2257.634731][T14418] __read_swap_cache_async+0x2b9/0x510 [ 2257.640202][T14418] swap_cluster_readahead+0x276/0x3f0 [ 2257.645633][T14418] swapin_readahead+0xe2/0x7a0 [ 2257.650423][T14418] ? __filemap_get_folio+0x41a/0x5a0 [ 2257.655728][T14418] ? __lruvec_stat_mod_folio+0xd7/0x120 [ 2257.661363][T14418] ? swap_cache_get_folio+0x6e/0x200 [ 2257.666694][T14418] do_swap_page+0x44c/0x1570 [ 2257.671307][T14418] ? __rcu_read_lock+0x35/0x50 [ 2257.676170][T14418] ? pte_offset_map_nolock+0x124/0x1d0 [ 2257.681659][T14418] handle_mm_fault+0x7f6/0x27b0 [ 2257.686533][T14418] ? mas_walk+0x204/0x320 [ 2257.690872][T14418] exc_page_fault+0x3ff/0x6d0 [ 2257.695573][T14418] asm_exc_page_fault+0x26/0x30 [ 2257.700444][T14418] RIP: 0033:0x7f7bafc29f2b [ 2257.704864][T14418] Code: 00 31 f6 e8 b7 ea ff ff 48 81 c3 d0 00 00 00 48 39 dd 0f 84 68 fd ff ff 80 7b 20 00 48 89 df 74 e7 e8 49 cc ff ff 84 c0 74 d7 <80> 3d de 11 14 00 00 48 8b 83 a8 00 00 00 75 be 8b 00 89 83 9c 00 [ 2257.724545][T14418] RSP: 002b:00007ffe03e8f430 EFLAGS: 00010202 [ 2257.730644][T14418] RAX: 0000000000000001 RBX: 00007f7bafd9ef80 RCX: 0000000000227068 [ 2257.738622][T14418] RDX: 000000000000020b RSI: 00007ffe03e8f410 RDI: 00007f7bafd9ef80 [ 2257.746597][T14418] RBP: 00007f7bafda0980 R08: 0000000000000010 R09: 00007ffe03fbe0b0 [ 2257.754593][T14418] R10: 00007ffe03fbe080 R11: 0000000000069e04 R12: 0000000000227224 [ 2257.762594][T14418] R13: ffffffffffffffff R14: 00007f7baf7f3000 R15: 0000000000226ee3 [ 2257.770642][T14418] [ 2257.773849][T14418] memory: usage 307200kB, limit 307200kB, failcnt 2981 [ 2257.780754][T14418] memory+swap: usage 307552kB, limit 9007199254740988kB, failcnt 0 [ 2257.788690][T14418] kmem: usage 307156kB, limit 9007199254740988kB, failcnt 0 [ 2257.796046][T14418] Memory cgroup stats for /syz3: [ 2257.796349][T14418] cache 8192 [ 2257.804564][T14418] rss 24576 [ 2257.807736][T14418] shmem 0 [ 2257.810689][T14418] mapped_file 0 [ 2257.814152][T14418] dirty 8192 [ 2257.817367][T14418] writeback 0 [ 2257.820651][T14418] workingset_refault_anon 70 [ 2257.825288][T14418] workingset_refault_file 20 [ 2257.829879][T14418] swap 360448 [ 2257.833270][T14418] swapcached 36864 [ 2257.837012][T14418] pgpgin 1653583 [ 2257.840570][T14418] pgpgout 1653572 [ 2257.844251][T14418] pgfault 1247844 [ 2257.847988][T14418] pgmajfault 23 [ 2257.851462][T14418] inactive_anon 0 [ 2257.855114][T14418] active_anon 0 [ 2257.858599][T14418] inactive_file 8192 [ 2257.862494][T14418] active_file 0 [ 2257.866016][T14418] unevictable 0 [ 2257.869482][T14418] hierarchical_memory_limit 314572800 [ 2257.874953][T14418] hierarchical_memsw_limit 9223372036854771712 [ 2257.881111][T14418] total_cache 8192 [ 2257.884868][T14418] total_rss 24576 [ 2257.888580][T14418] total_shmem 0 [ 2257.892040][T14418] total_mapped_file 0 [ 2257.896048][T14418] total_dirty 8192 [ 2257.899848][T14418] total_writeback 0 [ 2257.903651][T14418] total_workingset_refault_anon 70 [ 2257.908855][T14418] total_workingset_refault_file 20 [ 2257.914039][T14418] total_swap 360448 [ 2257.917863][T14418] total_swapcached 36864 [ 2257.922116][T14418] total_pgpgin 1653583 [ 2257.926217][T14418] total_pgpgout 1653572 [ 2257.930375][T14418] total_pgfault 1247844 [ 2257.934546][T14418] total_pgmajfault 23 [ 2257.938599][T14418] total_inactive_anon 0 12:14:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) [ 2257.942749][T14418] total_active_anon 0 [ 2257.946795][T14418] total_inactive_file 8192 [ 2257.951210][T14418] total_active_file 0 [ 2257.955211][T14418] total_unevictable 0 [ 2257.959244][T14418] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=14418,uid=0 [ 2257.974672][T14418] Memory cgroup out of memory: Killed process 14418 (syz-executor.3) total-vm:48488kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 12:14:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r4, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000800)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x40}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="b5cb3b7b900ddbabd4358907819cd4e9bca9fd1614bc72e40253ba6265d6cd6e730f677f9f191d"], &(0x7f0000001e40)='GPL\x00'}, 0xa3) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async, rerun: 32) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000080)="db6f04d51c36d136370870f55a438cd53460bd4701c3c52b215f595a567ff11f67443f51d2fafa14d92730177a01b8b7530ba60a05324bb10fded8551f23f7361ebac39ac8303abf37f153c7719ea2f9712086ea539383683bb0633c624a5d24beb0c0d7bb067c42869497b85ecc49b28b70ed87e8fc2f50f461d093d7af64485d1d5d60c1c1e12f07f8560085df7261b11a6d87dbdb837b8ae8042d22ac08c2b4a9d919bb25", &(0x7f0000000140)=@buf="ecf0435691dd0f98a5cfad3353c03467c202db97a8552e78d1353604dda255068e67c8a9383815ef7effab06bcb2095df9a2820eb291ec1f9c6ac325b17aa2c4355cf402e21d3c9f282216ce42", 0x4}, 0x20) (rerun: 32) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xa77d, 0x0, 0xffffffffffffffff, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x12, 0x4, 0x1, 0x2, 0x48, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@generic={0x7, 0x3, "86"}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x6c010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x15, 0x71, 0x3c, 0x2, 0x1409, 0xffffffffffffffff, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r9, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r10 = accept4$bt_l2cap(r9, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r10, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r11, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r13 = accept4$bt_l2cap(r10, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r11, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r13, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r12, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r15}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r16], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r11, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r14, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r11, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) mknodat$loop(r14, &(0x7f0000000580)='./file0\x00', 0x1, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x11, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6081}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x7, 0x79, &(0x7f0000000240)=""/121, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x6, 0x5, 0x2a000000}, 0x10, 0xa6ef, r0, 0x4, &(0x7f0000000380)=[r4, r7, r8, 0x1], &(0x7f00000003c0)=[{0x5, 0x1, 0xc, 0xa}, {0x0, 0x5, 0x0, 0xc}, {0x4, 0x2, 0x9, 0x5}, {0x1, 0x5, 0x10, 0xa}], 0x10, 0x5}, 0x90) 12:14:38 executing program 0: syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) syz_clone(0x200000, &(0x7f0000000000)="21ce05a346e5dec2735f8fb33a75293f15b73fa0f3fc87f05ec0413962b00c4062000aed21adff9f3bf6875da3d24d2020c60f567c3b6da1d1e8c7d8b7", 0x3d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="f20967493e7ce3db2aee42654000f373294faee30803102fb175b80caebb73331305629cfdf5977be51e600e336f3afb0c8cf42a0eef9001c450f301070a880cff163a5d2d3db555f7a88b74a9aa755512f856c960341697982a177763f529dfad68c7e0ecafdb5af2014569b6ccb5b573cb227c70cd21a8dc5bcc2b9131a83444092ec9079668c786dcd14a6abd9c2c3d119dc080f3b344cbfcadcdafc9d3f4452f3a570e4b067ca6abdc04841ca0293339790aa82184ce6910995a83ac") 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x0, 0x7, 0xa, 0x2, 0xfffffffffffffff4, 0x10}, @alu={0x7, 0x1, 0x3, 0x9, 0x6, 0x30, 0x10}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @generic={0x2, 0x0, 0x4, 0x7f, 0x6}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xbd}}, @generic={0x0, 0x5, 0xc, 0x9e64, 0x7}, @generic={0x8, 0x0, 0x9, 0x9, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00'}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x2, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000100000018000000a99c12dd770d658ed433aa377f7ea718e5bb2f2ebdc70996cd7c9911b3b1b9c44564b399fe4998a550ae697b145e9f2213c4ce99d8ebabed191479b8f3d91d0007dd5d7bed05cfbaf672378ecf97cc66ec4d4c752dc78091a7836fdd4ca4c1a4c0fa5ed8ab9688df0c13afcaef5adb56f56175f9195b96", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x37, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xbc48}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0x5, 0x2, 0x3, 0x6}, @alu={0x7, 0x0, 0x1, 0xb, 0x7, 0x4, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x2, 0x1, 0x4, 0x6, 0x3, 0x40, 0x4}, @printk, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3dd4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x90) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3b7, 0x0, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%pi6 \x00'}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x75f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x48) r16 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x16, &(0x7f0000000b40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x1, 0x7, 0x4, 0x8, 0x40, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x270e}}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2b, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x6, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r7, r11, r13, r10, r15], 0x0, 0x10, 0x5462}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r16, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff6401ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b0000000000"]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r18, @ANYBLOB="0000000000000000b703000000000000850000000c000500b700000001000080"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r17, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)='%-010d \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x18000, 0xbe, &(0x7f0000000280)=""/190, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xb, 0x81, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000780)=[r11, r12, r13, r14, r15, r18, r19, r20], &(0x7f00000007c0)=[{0x2, 0x5, 0x4, 0x5}], 0x10, 0x79}, 0x90) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async, rerun: 32) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async, rerun: 32) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x2, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000100000018000000a99c12dd770d658ed433aa377f7ea718e5bb2f2ebdc70996cd7c9911b3b1b9c44564b399fe4998a550ae697b145e9f2213c4ce99d8ebabed191479b8f3d91d0007dd5d7bed05cfbaf672378ecf97cc66ec4d4c752dc78091a7836fdd4ca4c1a4c0fa5ed8ab9688df0c13afcaef5adb56f56175f9195b96", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x37, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xbc48}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0x5, 0x2, 0x3, 0x6}, @alu={0x7, 0x0, 0x1, 0xb, 0x7, 0x4, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x2, 0x1, 0x4, 0x6, 0x3, 0x40, 0x4}, @printk, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3dd4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x90) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3b7, 0x0, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%pi6 \x00'}, 0x20) (async, rerun: 64) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) (async, rerun: 64) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x75f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x48) (async) r16 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x16, &(0x7f0000000b40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x1, 0x7, 0x4, 0x8, 0x40, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x270e}}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2b, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x6, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r7, r11, r13, r10, r15], 0x0, 0x10, 0x5462}, 0x90) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r16, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff6401ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b0000000000"]}) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r18, @ANYBLOB="0000000000000000b703000000000000850000000c000500b700000001000080"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r17, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)='%-010d \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x18000, 0xbe, &(0x7f0000000280)=""/190, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xb, 0x81, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000780)=[r11, r12, r13, r14, r15, r18, r19, r20], &(0x7f00000007c0)=[{0x2, 0x5, 0x4, 0x5}], 0x10, 0x79}, 0x90) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x0, 0x7, 0xa, 0x2, 0xfffffffffffffff4, 0x10}, @alu={0x7, 0x1, 0x3, 0x9, 0x6, 0x30, 0x10}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @generic={0x2, 0x0, 0x4, 0x7f, 0x6}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xbd}}, @generic={0x0, 0x5, 0xc, 0x9e64, 0x7}, @generic={0x8, 0x0, 0x9, 0x9, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00'}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x13, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x0, 0x7, 0xa, 0x2, 0xfffffffffffffff4, 0x10}, @alu={0x7, 0x1, 0x3, 0x9, 0x6, 0x30, 0x10}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @generic={0x2, 0x0, 0x4, 0x7f, 0x6}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xbd}}, @generic={0x0, 0x5, 0xc, 0x9e64, 0x7}, @generic={0x8, 0x0, 0x9, 0x9, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00'}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xffff8000, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x7fffffff, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x2, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x2, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000100000018000000a99c12dd770d658ed433aa377f7ea718e5bb2f2ebdc70996cd7c9911b3b1b9c44564b399fe4998a550ae697b145e9f2213c4ce99d8ebabed191479b8f3d91d0007dd5d7bed05cfbaf672378ecf97cc66ec4d4c752dc78091a7836fdd4ca4c1a4c0fa5ed8ab9688df0c13afcaef5adb56f56175f9195b96", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000100000018000000a99c12dd770d658ed433aa377f7ea718e5bb2f2ebdc70996cd7c9911b3b1b9c44564b399fe4998a550ae697b145e9f2213c4ce99d8ebabed191479b8f3d91d0007dd5d7bed05cfbaf672378ecf97cc66ec4d4c752dc78091a7836fdd4ca4c1a4c0fa5ed8ab9688df0c13afcaef5adb56f56175f9195b96", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x37, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xbc48}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@jmp={0x5, 0x1, 0x5, 0x2, 0x3, 0x6}, @alu={0x7, 0x0, 0x1, 0xb, 0x7, 0x4, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x2, 0x1, 0x4, 0x6, 0x3, 0x40, 0x4}, @printk, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3dd4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x90) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x3b7, 0x0, 0x1, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%pi6 \x00'}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x75f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) (async) r16 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x16, &(0x7f0000000b40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff8}, @alu={0x4, 0x1, 0x7, 0x4, 0x8, 0x40, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x270e}}], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2b, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x6, 0x6, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r7, r11, r13, r10, r15], 0x0, 0x10, 0x5462}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r16, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080000100000fff000000064609005800670000142f9078000000006401010207136aac1414bbffffffff0a0101016401010001831f22e000000100000000ffffffff6401ffffffff0a0101007f000001880e9616b0fa3b3e056b91518c8b0000000000"]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r18, @ANYBLOB="0000000000000000b703000000000000850000000c000500b700000001000080"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r17, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=ANY=[@ANYBLOB="850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000850000006e00000018120000", @ANYRES32=r18, @ANYBLOB="0000000000000000b703000000000000850000000c000500b700000001000080"], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r17, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, 0xffffffffffffffff], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) (async) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)='%-010d \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x1f, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x18000, 0xbe, &(0x7f0000000280)=""/190, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xb, 0x81, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000780)=[r11, r12, r13, r14, r15, r18, r19, r20], &(0x7f00000007c0)=[{0x2, 0x5, 0x4, 0x5}], 0x10, 0x79}, 0x90) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xffff8000, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x7fffffff, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xffff8000, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x7fffffff, 0x8}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x1f, 0x7, 0x0, @mcast1, @loopback, 0x8, 0x80, 0x400, 0x1}}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x80, 0x40, 0x10001, 0xc59, {{0x37, 0x4, 0x1, 0x7, 0xdc, 0x68, 0x0, 0xff, 0x4, 0x0, @broadcast, @private=0x6, {[@lsrr={0x83, 0x17, 0x7e, [@local, @broadcast, @local, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0xf, 0x45, [@dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x64010102, @private=0xa010102]}, @noop, @ssrr={0x89, 0xf, 0x1, [@rand_addr=0x64010102, @multicast2, @empty]}, @generic={0x88, 0x3, "87"}, @rr={0x7, 0x13, 0xc8, [@local, @remote, @local, @private=0xa010100]}, @rr={0x7, 0xf, 0xe6, [@local, @rand_addr=0x64010100, @empty]}, @timestamp_addr={0x44, 0x54, 0x77, 0x1, 0x4, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xff}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x7}, {@private=0xa010101, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x49f0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff}, {@broadcast}, {@multicast1, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x100}]}, @ra={0x94, 0x4}, @rr={0x7, 0x13, 0x7c, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0xa}, @dev={0xac, 0x14, 0x14, 0x25}]}]}}}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_flowlabel\x00') setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000440)=0x81, 0x4) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000b00)='net/udplite6\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000006a00000027bd7000fddbdf3a0a00000000fcffff06fff90002000000"], 0x20}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0x0}}, './file0\x00'}) sendto$inet(r3, &(0x7f0000000340)="0e8550801b1f90000b1e0fc99926913cbe7295318bf9498ad90ab338c4071c9465ba19dcd47c9114f5acc56a416b9a39c30b112786fe7d3f853a399de509d9f3e40017926e", 0x45, 0x44000, &(0x7f00000003c0)={0x2, 0x4e22, @empty}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x9, '\x00', r0, r3, 0x0, 0x0, 0x4}, 0x48) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x18, 0x3f9, 0x400, 0x70bd25, 0x25dfdbfd, {0x0, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000055}, 0x24008005) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0x108, 0x310, 0xffffffff, 0x310, 0x210, 0x3e8, 0x3e8, 0xffffffff, 0x3e8, 0x3e8, 0x5, &(0x7f0000000480), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x8}, @multicast2, 0xff000000, 0xffffff00, 'dvmrp0\x00', 'vlan0\x00', {0xd94678b2a07ba351}, {}, 0x0, 0x2, 0x20}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x10000, 0xc35]}}, @common=@addrtype={{0x30}, {0xb82, 0x205, 0x1, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010100, @private=0xa010101, @icmp_id=0x67, @port=0x4e21}}}}, {{@ip={@local, @broadcast, 0xff000000, 0xffffff00, 'nr0\x00', 'bridge0\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6], 0x1}}, @common=@addrtype={{0x30}, {0x5, 0xa04, 0x0, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @empty, @remote, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x9, 0x240]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x6, 0x4, 0x2, 0x0, 0x3, 0x4], 0x1, 0x4}, {0x0, [0x3, 0x1, 0x2, 0x2, 0x7, 0x5], 0x3, 0x470bceda43823cf}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}, {[0x800, 0x7]}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast2, @port=0x4e21, @icmp_id=0x68}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYRES64=r4], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x90) 12:14:38 executing program 4: socketpair(0x1a, 0x800, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000040)=0x1, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) sendto$inet(r0, &(0x7f0000000180)="90c70692ff2b944d0cea9a8676ea156a411c27e3d3af1ee60870aa70b51f2aeae0c2296be2ef1265cd569269d8b2d3af54de491bc495823e56faf6cdafdb2ab6f330305b3553c3eb18aa20232f3087a2f2c8d654", 0x54, 0x20000000, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000100)={0x1f84ef9ae7ff4aae, @empty, 0x4e22, 0x2, 'lc\x00', 0x0, 0x9, 0x1e}, 0x2c) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, r1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x80, 0x40, 0x10001, 0xc59, {{0x37, 0x4, 0x1, 0x7, 0xdc, 0x68, 0x0, 0xff, 0x4, 0x0, @broadcast, @private=0x6, {[@lsrr={0x83, 0x17, 0x7e, [@local, @broadcast, @local, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0xf, 0x45, [@dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x64010102, @private=0xa010102]}, @noop, @ssrr={0x89, 0xf, 0x1, [@rand_addr=0x64010102, @multicast2, @empty]}, @generic={0x88, 0x3, "87"}, @rr={0x7, 0x13, 0xc8, [@local, @remote, @local, @private=0xa010100]}, @rr={0x7, 0xf, 0xe6, [@local, @rand_addr=0x64010100, @empty]}, @timestamp_addr={0x44, 0x54, 0x77, 0x1, 0x4, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xff}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x7}, {@private=0xa010101, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x49f0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff}, {@broadcast}, {@multicast1, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x100}]}, @ra={0x94, 0x4}, @rr={0x7, 0x13, 0x7c, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0xa}, @dev={0xac, 0x14, 0x14, 0x25}]}]}}}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_flowlabel\x00') setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000440)=0x81, 0x4) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000b00)='net/udplite6\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000006a00000027bd7000fddbdf3a0a00000000fcffff06fff90002000000"], 0x20}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0x0}}, './file0\x00'}) sendto$inet(r3, &(0x7f0000000340)="0e8550801b1f90000b1e0fc99926913cbe7295318bf9498ad90ab338c4071c9465ba19dcd47c9114f5acc56a416b9a39c30b112786fe7d3f853a399de509d9f3e40017926e", 0x45, 0x44000, &(0x7f00000003c0)={0x2, 0x4e22, @empty}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x9, '\x00', r0, r3, 0x0, 0x0, 0x4}, 0x48) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x18, 0x3f9, 0x400, 0x70bd25, 0x25dfdbfd, {0x0, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000055}, 0x24008005) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0x108, 0x310, 0xffffffff, 0x310, 0x210, 0x3e8, 0x3e8, 0xffffffff, 0x3e8, 0x3e8, 0x5, &(0x7f0000000480), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x8}, @multicast2, 0xff000000, 0xffffff00, 'dvmrp0\x00', 'vlan0\x00', {0xd94678b2a07ba351}, {}, 0x0, 0x2, 0x20}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x10000, 0xc35]}}, @common=@addrtype={{0x30}, {0xb82, 0x205, 0x1, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010100, @private=0xa010101, @icmp_id=0x67, @port=0x4e21}}}}, {{@ip={@local, @broadcast, 0xff000000, 0xffffff00, 'nr0\x00', 'bridge0\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6], 0x1}}, @common=@addrtype={{0x30}, {0x5, 0xa04, 0x0, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @empty, @remote, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x9, 0x240]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x6, 0x4, 0x2, 0x0, 0x3, 0x4], 0x1, 0x4}, {0x0, [0x3, 0x1, 0x2, 0x2, 0x7, 0x5], 0x3, 0x470bceda43823cf}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}, {[0x800, 0x7]}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast2, @port=0x4e21, @icmp_id=0x68}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYRES64=r4], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x90) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x80, 0x40, 0x10001, 0xc59, {{0x37, 0x4, 0x1, 0x7, 0xdc, 0x68, 0x0, 0xff, 0x4, 0x0, @broadcast, @private=0x6, {[@lsrr={0x83, 0x17, 0x7e, [@local, @broadcast, @local, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0xf, 0x45, [@dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x64010102, @private=0xa010102]}, @noop, @ssrr={0x89, 0xf, 0x1, [@rand_addr=0x64010102, @multicast2, @empty]}, @generic={0x88, 0x3, "87"}, @rr={0x7, 0x13, 0xc8, [@local, @remote, @local, @private=0xa010100]}, @rr={0x7, 0xf, 0xe6, [@local, @rand_addr=0x64010100, @empty]}, @timestamp_addr={0x44, 0x54, 0x77, 0x1, 0x4, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xff}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x7}, {@private=0xa010101, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x49f0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff}, {@broadcast}, {@multicast1, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x100}]}, @ra={0x94, 0x4}, @rr={0x7, 0x13, 0x7c, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0xa}, @dev={0xac, 0x14, 0x14, 0x25}]}]}}}}}) (async) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_flowlabel\x00') (async) setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000440)=0x81, 0x4) (async) gettid() (async) syz_open_procfs(r2, &(0x7f0000000b00)='net/udplite6\x00') (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000006a00000027bd7000fddbdf3a0a00000000fcffff06fff90002000000"], 0x20}}, 0x50) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file0\x00'}) (async) sendto$inet(r3, &(0x7f0000000340)="0e8550801b1f90000b1e0fc99926913cbe7295318bf9498ad90ab338c4071c9465ba19dcd47c9114f5acc56a416b9a39c30b112786fe7d3f853a399de509d9f3e40017926e", 0x45, 0x44000, &(0x7f00000003c0)={0x2, 0x4e22, @empty}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x9, '\x00', r0, r3, 0x0, 0x0, 0x4}, 0x48) (async) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x18, 0x3f9, 0x400, 0x70bd25, 0x25dfdbfd, {0x0, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000055}, 0x24008005) (async) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0x108, 0x310, 0xffffffff, 0x310, 0x210, 0x3e8, 0x3e8, 0xffffffff, 0x3e8, 0x3e8, 0x5, &(0x7f0000000480), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x8}, @multicast2, 0xff000000, 0xffffff00, 'dvmrp0\x00', 'vlan0\x00', {0xd94678b2a07ba351}, {}, 0x0, 0x2, 0x20}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x10000, 0xc35]}}, @common=@addrtype={{0x30}, {0xb82, 0x205, 0x1, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010100, @private=0xa010101, @icmp_id=0x67, @port=0x4e21}}}}, {{@ip={@local, @broadcast, 0xff000000, 0xffffff00, 'nr0\x00', 'bridge0\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6], 0x1}}, @common=@addrtype={{0x30}, {0x5, 0xa04, 0x0, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @empty, @remote, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x9, 0x240]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x6, 0x4, 0x2, 0x0, 0x3, 0x4], 0x1, 0x4}, {0x0, [0x3, 0x1, 0x2, 0x2, 0x7, 0x5], 0x3, 0x470bceda43823cf}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}, {[0x800, 0x7]}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast2, @port=0x4e21, @icmp_id=0x68}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYRES64=r4], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x90) (async) 12:14:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, 0xffffffffffffffff, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) [ 2258.488502][T14571] IPVS: set_ctl: invalid protocol: 19118 0.0.0.0:20002 12:14:38 executing program 4: socketpair(0x1a, 0x800, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000040)=0x1, 0x4) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) sendto$inet(r0, &(0x7f0000000180)="90c70692ff2b944d0cea9a8676ea156a411c27e3d3af1ee60870aa70b51f2aeae0c2296be2ef1265cd569269d8b2d3af54de491bc495823e56faf6cdafdb2ab6f330305b3553c3eb18aa20232f3087a2f2c8d654", 0x54, 0x20000000, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) (async) inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000100)={0x1f84ef9ae7ff4aae, @empty, 0x4e22, 0x2, 'lc\x00', 0x0, 0x9, 0x1e}, 0x2c) 12:14:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, 0xffffffffffffffff, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x80, 0x40, 0x10001, 0xc59, {{0x37, 0x4, 0x1, 0x7, 0xdc, 0x68, 0x0, 0xff, 0x4, 0x0, @broadcast, @private=0x6, {[@lsrr={0x83, 0x17, 0x7e, [@local, @broadcast, @local, @broadcast, @private=0xa010102]}, @ssrr={0x89, 0xf, 0x45, [@dev={0xac, 0x14, 0x14, 0x18}, @rand_addr=0x64010102, @private=0xa010102]}, @noop, @ssrr={0x89, 0xf, 0x1, [@rand_addr=0x64010102, @multicast2, @empty]}, @generic={0x88, 0x3, "87"}, @rr={0x7, 0x13, 0xc8, [@local, @remote, @local, @private=0xa010100]}, @rr={0x7, 0xf, 0xe6, [@local, @rand_addr=0x64010100, @empty]}, @timestamp_addr={0x44, 0x54, 0x77, 0x1, 0x4, [{@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xff}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x7}, {@private=0xa010101, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x49f0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff}, {@broadcast}, {@multicast1, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x100}]}, @ra={0x94, 0x4}, @rr={0x7, 0x13, 0x7c, [@broadcast, @local, @dev={0xac, 0x14, 0x14, 0xa}, @dev={0xac, 0x14, 0x14, 0x25}]}]}}}}}) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_flowlabel\x00') setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000440)=0x81, 0x4) (async) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000b00)='net/udplite6\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000006a00000027bd7000fddbdf3a0a00000000fcffff06fff90002000000"], 0x20}}, 0x50) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0x0}}, './file0\x00'}) sendto$inet(r3, &(0x7f0000000340)="0e8550801b1f90000b1e0fc99926913cbe7295318bf9498ad90ab338c4071c9465ba19dcd47c9114f5acc56a416b9a39c30b112786fe7d3f853a399de509d9f3e40017926e", 0x45, 0x44000, &(0x7f00000003c0)={0x2, 0x4e22, @empty}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x9, '\x00', r0, r3, 0x0, 0x0, 0x4}, 0x48) (async) sendmsg$AUDIT_TTY_SET(r3, &(0x7f0000000ac0)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x18, 0x3f9, 0x400, 0x70bd25, 0x25dfdbfd, {0x0, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000055}, 0x24008005) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0x108, 0x310, 0xffffffff, 0x310, 0x210, 0x3e8, 0x3e8, 0xffffffff, 0x3e8, 0x3e8, 0x5, &(0x7f0000000480), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x8}, @multicast2, 0xff000000, 0xffffff00, 'dvmrp0\x00', 'vlan0\x00', {0xd94678b2a07ba351}, {}, 0x0, 0x2, 0x20}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x10000, 0xc35]}}, @common=@addrtype={{0x30}, {0xb82, 0x205, 0x1, 0x1}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x1, @rand_addr=0x64010100, @private=0xa010101, @icmp_id=0x67, @port=0x4e21}}}}, {{@ip={@local, @broadcast, 0xff000000, 0xffffff00, 'nr0\x00', 'bridge0\x00', {}, {0xff}, 0x1, 0x0, 0x2}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6], 0x1}}, @common=@addrtype={{0x30}, {0x5, 0xa04, 0x0, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @empty, @remote, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x9, 0x240]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x6, 0x4, 0x2, 0x0, 0x3, 0x4], 0x1, 0x4}, {0x0, [0x3, 0x1, 0x2, 0x2, 0x7, 0x5], 0x3, 0x470bceda43823cf}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30}, {[0x800, 0x7]}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x8, @broadcast, @multicast2, @port=0x4e21, @icmp_id=0x68}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4e0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYRES64=r4], &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x90) 12:14:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x3f, 0x1, 0x0, 0xffffffffffffffff, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:38 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x6, 0x6, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r11, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x20}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x87e}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}}, 0x4006000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f00000000c0)='syzkaller\x00', 0xd1f, 0x0, 0x0, 0x41000, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xa, 0x4, 0xffff8001}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x10, 0x5}, 0x90) [ 2258.603005][T14583] IPVS: set_ctl: invalid protocol: 19118 0.0.0.0:20002 12:14:38 executing program 4: socketpair(0x1a, 0x800, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f0000000040)=0x1, 0x4) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) sendto$inet(r0, &(0x7f0000000180)="90c70692ff2b944d0cea9a8676ea156a411c27e3d3af1ee60870aa70b51f2aeae0c2296be2ef1265cd569269d8b2d3af54de491bc495823e56faf6cdafdb2ab6f330305b3553c3eb18aa20232f3087a2f2c8d654", 0x54, 0x20000000, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) (async) inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x90) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000100)={0x1f84ef9ae7ff4aae, @empty, 0x4e22, 0x2, 'lc\x00', 0x0, 0x9, 0x1e}, 0x2c) [ 2258.840197][T14513] syz-executor.3 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 2258.851614][T14513] CPU: 1 PID: 14513 Comm: syz-executor.3 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2258.861767][T14513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2258.871837][T14513] Call Trace: [ 2258.875123][T14513] [ 2258.878059][T14513] dump_stack_lvl+0xda/0x130 [ 2258.882669][T14513] dump_stack+0x15/0x20 [ 2258.886872][T14513] dump_header+0x82/0x2d0 [ 2258.891223][T14513] oom_kill_process+0x33a/0x4c0 [ 2258.896111][T14513] out_of_memory+0x9ca/0xbf0 [ 2258.900734][T14513] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2258.906837][T14513] mem_cgroup_out_of_memory+0x139/0x190 [ 2258.912407][T14513] try_charge_memcg+0x759/0xd20 [ 2258.917279][T14513] ? __swap_duplicate+0x29b/0x2b0 [ 2258.922311][T14513] ? radix_tree_lookup+0xf9/0x150 [ 2258.927364][T14513] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2258.933480][T14513] __read_swap_cache_async+0x2b9/0x510 [ 2258.938955][T14513] swap_cluster_readahead+0x276/0x3f0 [ 2258.944446][T14513] swapin_readahead+0xe2/0x7a0 [ 2258.949222][T14513] ? __filemap_get_folio+0x41a/0x5a0 [ 2258.954579][T14513] ? __lruvec_stat_mod_folio+0xd7/0x120 [ 2258.960137][T14513] ? swap_cache_get_folio+0x6e/0x200 [ 2258.965484][T14513] do_swap_page+0x44c/0x1570 [ 2258.970170][T14513] ? __rcu_read_lock+0x35/0x50 [ 2258.974946][T14513] ? pte_offset_map_nolock+0x124/0x1d0 [ 2258.980469][T14513] handle_mm_fault+0x7f6/0x27b0 [ 2258.985334][T14513] ? mas_walk+0x204/0x320 [ 2258.989811][T14513] exc_page_fault+0x3ff/0x6d0 [ 2258.994522][T14513] asm_exc_page_fault+0x26/0x30 [ 2258.999387][T14513] RIP: 0033:0x7f7bafc29da4 [ 2259.003803][T14513] Code: 01 00 00 69 3d 11 e9 c9 00 e8 03 00 00 48 8d 1d f2 51 17 00 e8 9d 5f 04 00 eb 0f 0f 1f 00 48 81 c3 d0 00 00 00 48 39 eb 74 be <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df e8 f7 ee ff ff eb [ 2259.023428][T14513] RSP: 002b:00007ffe03e8f430 EFLAGS: 00010206 [ 2259.029496][T14513] RAX: 0000000000000000 RBX: 00007f7bafd9ef80 RCX: 0000000000000000 [ 2259.037554][T14513] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000555556b0a788 [ 2259.045528][T14513] RBP: 00007f7bafda0980 R08: 0000000000000000 R09: 00007ffe03fbe0b0 [ 2259.053541][T14513] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002277a1 [ 2259.061519][T14513] R13: ffffffffffffffff R14: 00007f7baf7f3000 R15: 0000000000227460 [ 2259.069598][T14513] [ 2259.072677][T14513] memory: usage 307200kB, limit 307200kB, failcnt 3113 [ 2259.079606][T14513] memory+swap: usage 307596kB, limit 9007199254740988kB, failcnt 0 [ 2259.087593][T14513] kmem: usage 307184kB, limit 9007199254740988kB, failcnt 0 [ 2259.095037][T14513] Memory cgroup stats for /syz3: [ 2259.095241][T14513] cache 8192 [ 2259.103487][T14513] rss 8192 [ 2259.106698][T14513] shmem 0 [ 2259.109704][T14513] mapped_file 0 [ 2259.113166][T14513] dirty 8192 [ 2259.116397][T14513] writeback 8192 [ 2259.119952][T14513] workingset_refault_anon 102 [ 2259.124737][T14513] workingset_refault_file 20 [ 2259.129339][T14513] swap 405504 [ 2259.132631][T14513] swapcached 8192 [ 2259.136321][T14513] pgpgin 1653642 [ 2259.139872][T14513] pgpgout 1653638 [ 2259.143518][T14513] pgfault 1247961 [ 2259.147233][T14513] pgmajfault 42 [ 2259.150730][T14513] inactive_anon 0 [ 2259.154406][T14513] active_anon 8192 [ 2259.158204][T14513] inactive_file 0 [ 2259.161837][T14513] active_file 8192 [ 2259.165604][T14513] unevictable 0 [ 2259.169072][T14513] hierarchical_memory_limit 314572800 [ 2259.174460][T14513] hierarchical_memsw_limit 9223372036854771712 [ 2259.180611][T14513] total_cache 8192 [ 2259.184359][T14513] total_rss 8192 [ 2259.187975][T14513] total_shmem 0 [ 2259.191437][T14513] total_mapped_file 0 [ 2259.195606][T14513] total_dirty 8192 [ 2259.199625][T14513] total_writeback 8192 [ 2259.203758][T14513] total_workingset_refault_anon 102 [ 2259.209032][T14513] total_workingset_refault_file 20 [ 2259.214154][T14513] total_swap 405504 [ 2259.217995][T14513] total_swapcached 8192 [ 2259.222149][T14513] total_pgpgin 1653642 [ 2259.226353][T14513] total_pgpgout 1653638 [ 2259.230578][T14513] total_pgfault 1247961 [ 2259.234750][T14513] total_pgmajfault 42 [ 2259.238742][T14513] total_inactive_anon 0 [ 2259.242899][T14513] total_active_anon 8192 [ 2259.247192][T14513] total_inactive_file 0 [ 2259.251349][T14513] total_active_file 8192 [ 2259.255630][T14513] total_unevictable 0 [ 2259.259620][T14513] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=14513,uid=0 [ 2259.274961][T14513] Memory cgroup out of memory: Killed process 14513 (syz-executor.3) total-vm:46440kB, anon-rss:508kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:1000 [ 2259.339524][ T3080] syz-executor.1 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2259.350719][ T3080] CPU: 0 PID: 3080 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0 [ 2259.360813][ T3080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 2259.370978][ T3080] Call Trace: [ 2259.374278][ T3080] [ 2259.377213][ T3080] dump_stack_lvl+0xda/0x130 [ 2259.381813][ T3080] dump_stack+0x15/0x20 [ 2259.386002][ T3080] dump_header+0x82/0x2d0 [ 2259.390508][ T3080] oom_kill_process+0x33a/0x4c0 [ 2259.395392][ T3080] out_of_memory+0x9ca/0xbf0 [ 2259.400119][ T3080] ? try_to_free_mem_cgroup_pages+0x220/0x480 [ 2259.406227][ T3080] mem_cgroup_out_of_memory+0x139/0x190 [ 2259.411808][ T3080] try_charge_memcg+0x759/0xd20 [ 2259.416727][ T3080] ? __swap_duplicate+0x29b/0x2b0 [ 2259.421816][ T3080] ? radix_tree_lookup+0xf9/0x150 [ 2259.426857][ T3080] mem_cgroup_swapin_charge_folio+0x107/0x190 [ 2259.432944][ T3080] __read_swap_cache_async+0x2b9/0x510 [ 2259.438492][ T3080] swap_cluster_readahead+0x276/0x3f0 [ 2259.443877][ T3080] swapin_readahead+0xe2/0x7a0 [ 2259.448652][ T3080] ? __filemap_get_folio+0x41a/0x5a0 [ 2259.453988][ T3080] ? swap_cache_get_folio+0x6e/0x200 [ 2259.459368][ T3080] do_swap_page+0x44c/0x1570 [ 2259.464027][ T3080] ? __rcu_read_lock+0x35/0x50 [ 2259.468834][ T3080] ? pte_offset_map_nolock+0x124/0x1d0 [ 2259.474395][ T3080] handle_mm_fault+0x7f6/0x27b0 [ 2259.479272][ T3080] ? mas_walk+0x204/0x320 [ 2259.483614][ T3080] exc_page_fault+0x3ff/0x6d0 [ 2259.488449][ T3080] asm_exc_page_fault+0x26/0x30 [ 2259.493754][ T3080] RIP: 0033:0x7f6a5bdee175 [ 2259.498204][ T3080] Code: 00 00 0f 1f 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d 8e 6d 0d 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 89 74 [ 2259.517820][ T3080] RSP: 002b:00007ffd009d50f8 EFLAGS: 00010246 [ 2259.523966][ T3080] RAX: 0000000000000000 RBX: 0000000000004ede RCX: 00007f6a5bdee173 [ 2259.531940][ T3080] RDX: 00007ffd009d5110 RSI: 0000000000000000 RDI: 0000000000000000 [ 2259.539928][ T3080] RBP: 00007ffd009d519c R08: 0000000000000010 R09: 00007ffd009d70b0 [ 2259.547905][ T3080] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 2259.555902][ T3080] R13: 000000000022750c R14: 00000000002274a6 R15: 0000000000000008 [ 2259.563885][ T3080] [ 2259.567172][ T3080] memory: usage 307200kB, limit 307200kB, failcnt 20362 [ 2259.574115][ T3080] memory+swap: usage 307496kB, limit 9007199254740988kB, failcnt 0 [ 2259.582045][ T3080] kmem: usage 307192kB, limit 9007199254740988kB, failcnt 0 [ 2259.589374][ T3080] Memory cgroup stats for /syz1: [ 2259.589609][ T3080] cache 4096 [ 2259.597833][ T3080] rss 0 [ 2259.600602][ T3080] shmem 0 [ 2259.603548][ T3080] mapped_file 0 [ 2259.607083][ T3080] dirty 0 [ 2259.610075][ T3080] writeback 0 [ 2259.613498][ T3080] workingset_refault_anon 691 [ 2259.618209][ T3080] workingset_refault_file 2 [ 2259.622800][ T3080] swap 303104 [ 2259.626174][ T3080] swapcached 4096 [ 2259.629811][ T3080] pgpgin 1657679 [ 2259.633353][ T3080] pgpgout 1657677 [ 2259.637010][ T3080] pgfault 1275918 [ 2259.640646][ T3080] pgmajfault 247 [ 2259.644259][ T3080] inactive_anon 0 [ 2259.647969][ T3080] active_anon 0 [ 2259.651448][ T3080] inactive_file 0 [ 2259.655100][ T3080] active_file 4096 [ 2259.658819][ T3080] unevictable 0 [ 2259.662282][ T3080] hierarchical_memory_limit 314572800 [ 2259.667674][ T3080] hierarchical_memsw_limit 9223372036854771712 [ 2259.673835][ T3080] total_cache 4096 [ 2259.677580][ T3080] total_rss 0 [ 2259.680871][ T3080] total_shmem 0 [ 2259.684422][ T3080] total_mapped_file 0 [ 2259.688409][ T3080] total_dirty 0 [ 2259.691894][ T3080] total_writeback 0 [ 2259.695780][ T3080] total_workingset_refault_anon 691 [ 2259.700983][ T3080] total_workingset_refault_file 2 [ 2259.706020][ T3080] total_swap 303104 [ 2259.709833][ T3080] total_swapcached 4096 [ 2259.714051][ T3080] total_pgpgin 1657679 [ 2259.718229][ T3080] total_pgpgout 1657677 [ 2259.722465][ T3080] total_pgfault 1275918 [ 2259.726645][ T3080] total_pgmajfault 247 [ 2259.730718][ T3080] total_inactive_anon 0 [ 2259.735026][ T3080] total_active_anon 0 12:14:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) [ 2259.739011][ T3080] total_inactive_file 0 [ 2259.743176][ T3080] total_active_file 4096 [ 2259.747483][ T3080] total_unevictable 0 [ 2259.751469][ T3080] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14523,uid=0 [ 2259.766970][ T3080] Memory cgroup out of memory: Killed process 14530 (syz-executor.1) total-vm:46440kB, anon-rss:380kB, file-rss:8960kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 12:14:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 12:14:40 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:14:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x6, 0x6, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) (async) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) (async) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r11, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x20}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x87e}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}}, 0x4006000) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f00000000c0)='syzkaller\x00', 0xd1f, 0x0, 0x0, 0x41000, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xa, 0x4, 0xffff8001}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x10, 0x5}, 0x90) 12:14:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'gretap0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x1, 0x7, 0x4, 0x81, {{0x16, 0x4, 0x1, 0x1e, 0x58, 0x68, 0x0, 0x0, 0x29, 0x0, @remote, @loopback, {[@rr={0x7, 0x2b, 0x46, [@private=0xa010101, @loopback, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback, @private=0xa010102]}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x3, [0x10000, 0x7]}, @timestamp_addr={0x44, 0xc, 0x76, 0x1, 0x6, [{@local, 0x100}]}]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x40, r2, 0x888, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x848}, 0x20008040) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7f}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x101}]}, 0x68}, 0x1, 0x0, 0x0, 0x24004080}, 0x40002) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250100000008"], 0x1c}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x5c, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xf7}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040804}, 0x4000000) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r7}, 0x90) 12:14:40 executing program 0: syz_clone(0xf08e8080, 0x0, 0xffffffffffffffee, 0x0, 0x0, 0x0) syz_clone(0x200000, &(0x7f0000000000)="21ce05a346e5dec2735f8fb33a75293f15b73fa0f3fc87f05ec0413962b00c4062000aed21adff9f3bf6875da3d24d2020c60f567c3b6da1d1e8c7d8b7", 0x3d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="f20967493e7ce3db2aee42654000f373294faee30803102fb175b80caebb73331305629cfdf5977be51e600e336f3afb0c8cf42a0eef9001c450f301070a880cff163a5d2d3db555f7a88b74a9aa755512f856c960341697982a177763f529dfad68c7e0ecafdb5af2014569b6ccb5b573cb227c70cd21a8dc5bcc2b9131a83444092ec9079668c786dcd14a6abd9c2c3d119dc080f3b344cbfcadcdafc9d3f4452f3a570e4b067ca6abdc04841ca0293339790aa82184ce6910995a83ac") 12:14:40 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:14:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'gretap0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x1, 0x7, 0x4, 0x81, {{0x16, 0x4, 0x1, 0x1e, 0x58, 0x68, 0x0, 0x0, 0x29, 0x0, @remote, @loopback, {[@rr={0x7, 0x2b, 0x46, [@private=0xa010101, @loopback, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback, @private=0xa010102]}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x3, [0x10000, 0x7]}, @timestamp_addr={0x44, 0xc, 0x76, 0x1, 0x6, [{@local, 0x100}]}]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x40, r2, 0x888, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x848}, 0x20008040) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7f}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x101}]}, 0x68}, 0x1, 0x0, 0x0, 0x24004080}, 0x40002) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250100000008"], 0x1c}}, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x5c, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xf7}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040804}, 0x4000000) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r7}, 0x90) 12:14:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x6, 0x6, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r4 = accept4$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) (async) r7 = accept4$bt_l2cap(r4, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0), 0x80) (async) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r7, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r6, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r10], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r11, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x20}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x87e}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x58}}, 0x4006000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r5, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r8, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r5, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f00000000c0)='syzkaller\x00', 0xd1f, 0x0, 0x0, 0x41000, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xa, 0x4, 0xffff8001}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x10, 0x5}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f00000000c0)='syzkaller\x00', 0xd1f, 0x0, 0x0, 0x41000, 0x1, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xa, 0x4, 0xffff8001}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x10, 0x5}, 0x90) 12:14:40 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:14:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'gretap0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x1, 0x7, 0x4, 0x81, {{0x16, 0x4, 0x1, 0x1e, 0x58, 0x68, 0x0, 0x0, 0x29, 0x0, @remote, @loopback, {[@rr={0x7, 0x2b, 0x46, [@private=0xa010101, @loopback, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback, @private=0xa010102]}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x3, [0x10000, 0x7]}, @timestamp_addr={0x44, 0xc, 0x76, 0x1, 0x6, [{@local, 0x100}]}]}}}}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x40, r2, 0x888, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x848}, 0x20008040) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7f}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x101}]}, 0x68}, 0x1, 0x0, 0x0, 0x24004080}, 0x40002) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250100000008"], 0x1c}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), r1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x5c, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xf7}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040804}, 0x4000000) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r7}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'gretap0\x00', &(0x7f0000000400)={'syztnl1\x00', 0x0, 0x1, 0x7, 0x4, 0x81, {{0x16, 0x4, 0x1, 0x1e, 0x58, 0x68, 0x0, 0x0, 0x29, 0x0, @remote, @loopback, {[@rr={0x7, 0x2b, 0x46, [@private=0xa010101, @loopback, @private=0xa010102, @empty, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback, @private=0xa010102]}, @timestamp={0x44, 0xc, 0xdb, 0x0, 0x3, [0x10000, 0x7]}, @timestamp_addr={0x44, 0xc, 0x76, 0x1, 0x6, [{@local, 0x100}]}]}}}}}) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x40, r2, 0x888, 0x70bd25, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x848}, 0x20008040) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r3, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x7f}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x101}]}, 0x68}, 0x1, 0x0, 0x0, 0x24004080}, 0x40002) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010025bd7000fcdbdf250100000008"], 0x1c}}, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000380), r1) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) (async) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x5c, r2, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_TOKEN={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xf7}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040804}, 0x4000000) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00'}, 0xa3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r7}, 0x90) (async) 12:14:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "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"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x26, '\x00', r3, 0xffffffffffffffff, 0x3, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0x10, &(0x7f0000001dc0)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @call={0x85, 0x0, 0x0, 0x6e}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001e40)='syzkaller\x00', 0x2ee5f3cf, 0x0, 0x0, 0x40f00, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x4, 0xc, 0x400, 0xffffffff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001f80)=[0x1, r7], &(0x7f0000001fc0)=[{0x4, 0x5, 0x1, 0xa}, {0x4, 0x5, 0x10, 0x2}, {0x0, 0x2, 0xb, 0x4}, {0x2, 0x2, 0x10, 0x6}], 0x10, 0x4}, 0x90) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000002180)={{0x1, 0x1, 0x18, r2, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000021c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee00}}, './file0/file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x1a, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @alu={0x4, 0x0, 0x9, 0x4, 0x9, 0x30, 0x10}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x8}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001440)=@bpf_ext={0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x90) 12:14:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x3f, 0x1, 0x0, 0xffffffffffffffff, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 12:14:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x11, 0x2, &(0x7f0000000140)=@framed, &(0x7f0000001e40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x90) 12:14:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000000)=0x401, &(0x7f0000000040)=0x4) r1 = accept4$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x3f7, 0x200, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x800) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'syztnl0\x00', 0x0, 0x80, 0x1, 0xfff, 0x6, {{0x16, 0x4, 0x1, 0x2, 0x58, 0x67, 0x0, 0x14, 0x2f, 0x0, @empty, @rand_addr=0x64010102, {[@rr={0x7, 0x13, 0x6a, [@remote, @broadcast, @private=0xa010101, @rand_addr=0x64010100]}, @noop, @lsrr={0x83, 0x1f, 0x22, [@multicast1, @empty, @broadcast, @rand_addr=0x64010100, @broadcast, @private=0xa010100, @loopback]}, @generic={0x88, 0xe, "9616b0fa3b3e056b91518c8b"}, @end]}}}}}) r4 = accept4$bt_l2cap(r1, &(0x7f0000001b00)={0x1f, 0x0, @none}, &(0x7f0000001b40)=0xe, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000001b80)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, '4j6', "20c9c45edce08df0f530e7f5ec28470870fed7bdd0f5aadb825b8a7575acbee40326cbb25b4bbbff599d92769391bbbf00f41c4ca8400cdb65db90b80f92497e7c2411904463834ced723556f4e64a3e024b596250fe4e1c131506ba640d2d17905ae2384a83c3be7ff93c371022c667c14d29285225e413c3fae5be959a39be562a564ad21b6f77b8e2fe2665d2f3626cce236328c48ec882b24b40935a4b609424c75324670c3cdeb2b34290a40fe8b5b54397dff2a574a2c5aa7d02fb7e7075200cd00cf2b552f9d9733b05912aded9e0b85a45566fe9aab608edeacd09242176c1d03152ee7e66fc6d77a20233cebfa88ea4889bc4735607a6512e77f797"}}, 0x110) pipe2$watch_queue(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001d80)={{r4, 0xffffffffffffffff}, &(0x7f0000001d00), &(0x7f0000001d40)}, 0x20)